CVE-2021-32642
Missing input validation in dynamic discovery example scripts.
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master branch and 1.9 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually. The dyndisc scripts work independently of the radsecproxy code. The updated scripts can be used with any version of radsecproxy.
radsecproxy es un proxy RADIUS genérico que soporta transportes RADIUS UDP y TLS (RadSec). Una falta de comprobación de entrada en los scripts "naptr-eduroam.sh" y "radsec-dynsrv.sh" de radsecproxy puede conllevar a una inyección de configuración por medio de registros DNS de descubrimiento de peer radsec diseñados. Los usuarios están sujetos a una divulgación de información, una Denegación de Servicio, una Redirección de la conexión Radius a un servidor no autenticado que conlleva a un acceso a la red no autenticado. Los scripts de ejemplo actualizados están disponibles en la rama maestra y en la versión 1.9. Tome en cuenta que los scripts no forman parte del paquete de instalación y no son actualizados automáticamente. Si está usando los ejemplos, debe actualizarlos manualmente. Los scripts dyndisc funcionan independientemente del código radsecproxy. Los scripts actualizados pueden ser usados con cualquier versión de radsecproxy
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-12 CVE Reserved
- 2021-05-28 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/radsecproxy/radsecproxy/security/advisories/GHSA-56gw-9rj9-55rc | Third Party Advisory | |
https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | < 1.9.0 Search vendor "Uninett" for product "Radsecproxy" and version " < 1.9.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
|