Search criteria
21 vulnerabilities found for steelcentral_appinternals_dynamic_sampling_agent by riverbed
FKIE_CVE-2021-42857
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDaServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/da/pcf" API. The affected endpoint does not have any validation of the user's input that allows a malicious payload to be injected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDaServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/da/pcf\" API. The affected endpoint does not have any validation of the user\u0027s input that allows a malicious payload to be injected."
},
{
"lang": "es",
"value": "Se ha detectado que el agente de muestreo din\u00e1mico (DSA) AgentDaServlet de SteelCentral AppInternals presenta vulnerabilidades de salto de directorio en la API \"/api/appInternals/1.0/agent/da/pcf\". El endpoint afectado no comprueba la entrada del usuario, lo que permite inyectar una carga maliciosa"
}
],
"id": "CVE-2021-42857",
"lastModified": "2024-11-21T06:28:14.313",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:08.953",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42855
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the ".debug_command.config" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the "/api/appInternals/1.0/agent/configuration" API to map the corresponding ID to a command to be executed.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the \".debug_command.config\" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the \"/api/appInternals/1.0/agent/configuration\" API to map the corresponding ID to a command to be executed."
},
{
"lang": "es",
"value": "Se ha detectado que el agente de muestreo din\u00e1mico (DSA) de SteelCentral AppInternals usa el archivo \".debug_command.config\" para almacenar una cadena json que contiene una lista de ID y comandos preconfigurados. El archivo de configuraci\u00f3n es usado posteriormente por la API \"/api/appInternals/1.0/agent/configuration\" para asignar el ID correspondiente a un comando a ejecutar"
}
],
"id": "CVE-2021-42855",
"lastModified": "2024-11-21T06:28:14.067",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:07.343",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42856
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability."
},
{
"lang": "es",
"value": "Se ha detectado que el endpoint /DsaDataTest es susceptible de sufrir un ataque de tipo cross-site scripting (XSS). Se ha detectado que el par\u00e1metro Metric no presenta ninguna comprobaci\u00f3n de entrada en la entrada del usuario que permite a un atacante elaborar su propia carga \u00fatil maliciosa para desencadenar una vulnerabilidad de tipo XSS"
}
],
"id": "CVE-2021-42856",
"lastModified": "2024-11-21T06:28:14.190",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:07.997",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42854
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) PluginServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/plugin/pmx" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) PluginServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/plugin/pmx\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
},
{
"lang": "es",
"value": "Se ha detectado que el PluginServlet del agente de muestreo din\u00e1mico (DSA) de SteelCentral AppInternals presenta vulnerabilidades de salto de directorio en la API \"/api/appInternals/1.0/plugin/pmx\". El endpoint afectado no presenta ninguna comprobaci\u00f3n de la entrada del usuario que permite inyectar una carga \u00fatil maliciosa"
}
],
"id": "CVE-2021-42854",
"lastModified": "2024-11-21T06:28:13.940",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:06.840",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42853
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the "/api/appInternals/1.0/agent/diagnostic/logs" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the \"/api/appInternals/1.0/agent/diagnostic/logs\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
},
{
"lang": "es",
"value": "Se ha detectado que el agente de muestreo din\u00e1mico (DSA) AgentDiagnosticServlet de SteelCentral AppInternals presenta una vulnerabilidad salto de directorio en la API \"/api/appInternals/1.0/agent/diagnostic/logs\". El endpoint afectado no comprueba la entrada del usuario, lo que permite inyectar una carga maliciosa"
}
],
"id": "CVE-2021-42853",
"lastModified": "2024-11-21T06:28:13.813",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:06.360",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42787
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
9.4 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/configuration" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/configuration\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
},
{
"lang": "es",
"value": "Se ha detectado que el agente de muestreo din\u00e1mico (DSA) AgentConfigurationServlet de SteelCentral AppInternals presenta vulnerabilidades salto de directorio en la API \"/api/appInternals/1.0/agent/configuration\". El endpoint afectado no presenta ninguna comprobaci\u00f3n de la entrada del usuario que permite inyectar una carga \u00fatil maliciosa"
}
],
"id": "CVE-2021-42787",
"lastModified": "2024-11-21T06:28:10.580",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:05.807",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-42786
Vulnerability from fkie_nvd - Published: 2022-03-10 17:44 - Updated: 2024-11-21 06:28
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9EBF00-4071-41C0-B05A-D942ACAB5F1A",
"versionEndExcluding": "11.8.8",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "021DA9F8-778D-485D-9F4C-395A44F1DFC7",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0564060-A159-41DD-B5F0-C7212F1891E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user\u0027s input that allowed a malicious payload to be injected."
},
{
"lang": "es",
"value": "Se ha detectado que el agente de muestreo din\u00e1mico (DSA) de SteelCentral AppInternals presenta vulnerabilidades de ejecuci\u00f3n de c\u00f3digo remota en varias instancias de las peticiones de la API. Los puntos finales afectados no comprueban la entrada del usuario, lo que permite inyectar una carga \u00fatil maliciosa"
}
],
"id": "CVE-2021-42786",
"lastModified": "2024-11-21T06:28:10.453",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-10T17:44:05.287",
"references": [
{
"source": "cve_disclosure@tech.gov.sg",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
],
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-42854 (GCVE-0-2021-42854)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:52 – Updated: 2024-09-16 17:54
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) PluginServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/plugin/pmx" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.8 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) PluginServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/plugin/pmx\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:52:02",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Read/Write/Delete at PluginServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42854",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Read/Write/Delete at PluginServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) PluginServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/plugin/pmx\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42854",
"datePublished": "2022-03-09T16:52:02.819876Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T17:54:38.635Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42856 (GCVE-0-2021-42856)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-17 04:18
VLAI?
Summary
It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability.
Severity ?
4.7 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.207Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:56",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Reflected Cross-site Scripting at DsaDataTest",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42856",
"STATE": "PUBLIC",
"TITLE": "Reflected Cross-site Scripting at DsaDataTest"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42856",
"datePublished": "2022-03-09T16:51:56.184251Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-17T04:18:57.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42787 (GCVE-0-2021-42787)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-16 22:35
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/configuration" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.4 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.149Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/configuration\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:50",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Write/Delete/Partial Read at AgentConfigurationServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42787",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Write/Delete/Partial Read at AgentConfigurationServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/configuration\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42787",
"datePublished": "2022-03-09T16:51:50.594465Z",
"dateReserved": "2021-10-21T00:00:00",
"dateUpdated": "2024-09-16T22:35:02.277Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42857 (GCVE-0-2021-42857)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-16 21:57
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDaServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/da/pcf" API. The affected endpoint does not have any validation of the user's input that allows a malicious payload to be injected.
Severity ?
5.3 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.207Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDaServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/da/pcf\" API. The affected endpoint does not have any validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:44",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Partial Write at AgentDaServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42857",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Partial Write at AgentDaServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDaServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/da/pcf\" API. The affected endpoint does not have any validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42857",
"datePublished": "2022-03-09T16:51:44.553702Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T21:57:35.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42855 (GCVE-0-2021-42855)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-17 02:36
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the ".debug_command.config" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the "/api/appInternals/1.0/agent/configuration" API to map the corresponding ID to a command to be executed.
Severity ?
7.8 (High)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.062Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the \".debug_command.config\" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the \"/api/appInternals/1.0/agent/configuration\" API to map the corresponding ID to a command to be executed."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:38",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Local privilege escalation due to misconfigured write permission on .debug_command.config file",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42855",
"STATE": "PUBLIC",
"TITLE": "Local privilege escalation due to misconfigured write permission on .debug_command.config file"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the \".debug_command.config\" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the \"/api/appInternals/1.0/agent/configuration\" API to map the corresponding ID to a command to be executed."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42855",
"datePublished": "2022-03-09T16:51:38.176848Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-17T02:36:31.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42786 (GCVE-0-2021-42786)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-17 04:10
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected.
Severity ?
9.8 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.184Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user\u0027s input that allowed a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:32",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Remote Code Execution at AgentControllerServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42786",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution at AgentControllerServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user\u0027s input that allowed a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42786",
"datePublished": "2022-03-09T16:51:32.667478Z",
"dateReserved": "2021-10-21T00:00:00",
"dateUpdated": "2024-09-17T04:10:02.066Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42853 (GCVE-0-2021-42853)
Vulnerability from cvelistv5 – Published: 2022-03-09 16:51 – Updated: 2024-09-16 17:09
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the "/api/appInternals/1.0/agent/diagnostic/logs" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.1 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the \"/api/appInternals/1.0/agent/diagnostic/logs\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:28",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Delete/Read at AgentDiagnosticServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42853",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Delete/Read at AgentDiagnosticServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the \"/api/appInternals/1.0/agent/diagnostic/logs\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42853",
"datePublished": "2022-03-09T16:51:28.521040Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T17:09:18.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42854 (GCVE-0-2021-42854)
Vulnerability from nvd – Published: 2022-03-09 16:52 – Updated: 2024-09-16 17:54
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) PluginServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/plugin/pmx" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.8 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) PluginServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/plugin/pmx\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:52:02",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Read/Write/Delete at PluginServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42854",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Read/Write/Delete at PluginServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) PluginServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/plugin/pmx\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Read-Write-Delete-at-PluginServlet-CVE-2021-42854"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42854",
"datePublished": "2022-03-09T16:52:02.819876Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T17:54:38.635Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42856 (GCVE-0-2021-42856)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-17 04:18
VLAI?
Summary
It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability.
Severity ?
4.7 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.207Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:56",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Reflected Cross-site Scripting at DsaDataTest",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42856",
"STATE": "PUBLIC",
"TITLE": "Reflected Cross-site Scripting at DsaDataTest"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the /DsaDataTest endpoint is susceptible to Cross-site scripting (XSS) attack. It was noted that the Metric parameter does not have any input checks on the user input that allows an attacker to craft its own malicious payload to trigger a XSS vulnerability."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Reflected-Cross-site-Scripting-at-DsaDataTest-CVE-2021-42856"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42856",
"datePublished": "2022-03-09T16:51:56.184251Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-17T04:18:57.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42787 (GCVE-0-2021-42787)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-16 22:35
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/configuration" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.4 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.149Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/configuration\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:50",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Write/Delete/Partial Read at AgentConfigurationServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42787",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Write/Delete/Partial Read at AgentConfigurationServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/configuration\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42787",
"datePublished": "2022-03-09T16:51:50.594465Z",
"dateReserved": "2021-10-21T00:00:00",
"dateUpdated": "2024-09-16T22:35:02.277Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42857 (GCVE-0-2021-42857)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-16 21:57
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDaServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/da/pcf" API. The affected endpoint does not have any validation of the user's input that allows a malicious payload to be injected.
Severity ?
5.3 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.207Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDaServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/da/pcf\" API. The affected endpoint does not have any validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:44",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Partial Write at AgentDaServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42857",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Partial Write at AgentDaServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDaServlet has directory traversal vulnerabilities at the \"/api/appInternals/1.0/agent/da/pcf\" API. The affected endpoint does not have any validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42857",
"datePublished": "2022-03-09T16:51:44.553702Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T21:57:35.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42855 (GCVE-0-2021-42855)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-17 02:36
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the ".debug_command.config" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the "/api/appInternals/1.0/agent/configuration" API to map the corresponding ID to a command to be executed.
Severity ?
7.8 (High)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.062Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the \".debug_command.config\" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the \"/api/appInternals/1.0/agent/configuration\" API to map the corresponding ID to a command to be executed."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:38",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Local privilege escalation due to misconfigured write permission on .debug_command.config file",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42855",
"STATE": "PUBLIC",
"TITLE": "Local privilege escalation due to misconfigured write permission on .debug_command.config file"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the \".debug_command.config\" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the \"/api/appInternals/1.0/agent/configuration\" API to map the corresponding ID to a command to be executed."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Local-privilege-escalation-due-to-misconfigured-write-permission-on-debug-command-config-file-CVE-2021-42855"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42855",
"datePublished": "2022-03-09T16:51:38.176848Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-17T02:36:31.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42786 (GCVE-0-2021-42786)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-17 04:10
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected.
Severity ?
9.8 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.184Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user\u0027s input that allowed a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:32",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Remote Code Execution at AgentControllerServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42786",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution at AgentControllerServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user\u0027s input that allowed a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42786",
"datePublished": "2022-03-09T16:51:32.667478Z",
"dateReserved": "2021-10-21T00:00:00",
"dateUpdated": "2024-09-17T04:10:02.066Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-42853 (GCVE-0-2021-42853)
Vulnerability from nvd – Published: 2022-03-09 16:51 – Updated: 2024-09-16 17:09
VLAI?
Summary
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the "/api/appInternals/1.0/agent/diagnostic/logs" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected.
Severity ?
9.1 (Critical)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Aternity | SteelCentral AppInternals Dynamic Sampling Agent |
Affected:
10.x
Affected: 12.13.0 , < 12.13.0 (custom) Affected: 11.8.8 , < 11.8.8 (custom) |
Credits
Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:38:50.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SteelCentral AppInternals Dynamic Sampling Agent",
"vendor": "Aternity",
"versions": [
{
"status": "affected",
"version": "10.x"
},
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.13.0",
"versionType": "custom"
},
{
"lessThan": "11.8.8",
"status": "affected",
"version": "11.8.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"datePublic": "2022-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the \"/api/appInternals/1.0/agent/diagnostic/logs\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T16:51:28",
"orgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"shortName": "GovTech CSG"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Directory Traversal Delete/Read at AgentDiagnosticServlet",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve_disclosure@tech.gov.sg",
"DATE_PUBLIC": "2022-02-23T10:30:00.000Z",
"ID": "CVE-2021-42853",
"STATE": "PUBLIC",
"TITLE": "Directory Traversal Delete/Read at AgentDiagnosticServlet"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SteelCentral AppInternals Dynamic Sampling Agent",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.13.0",
"version_value": "12.13.0"
},
{
"version_affected": "\u003c",
"version_name": "11.8.8",
"version_value": "11.8.8"
},
{
"version_affected": "=",
"version_name": "10.x",
"version_value": "10.x"
}
]
}
}
]
},
"vendor_name": "Aternity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent\u0027s (DSA) AgentDiagnosticServlet has directory traversal vulnerability at the \"/api/appInternals/1.0/agent/diagnostic/logs\" API. The affected endpoint does not have any input validation of the user\u0027s input that allows a malicious payload to be injected."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853",
"refsource": "CONFIRM",
"url": "https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Delete-Read-at-AgentDiagnosticServlet-CVE-2021-42853"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1a37b84a-8e51-4525-b3d6-87e2fae01dbd",
"assignerShortName": "GovTech CSG",
"cveId": "CVE-2021-42853",
"datePublished": "2022-03-09T16:51:28.521040Z",
"dateReserved": "2021-10-25T00:00:00",
"dateUpdated": "2024-09-16T17:09:18.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}