var-202108-0399
Vulnerability from variot
Dell EMC PowerScale OneFS contains an untrusted search path vulnerability. This vulnerability allows a user with (ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE) and (ISI_PRIV_SYS_UPGRADE or ISI_PRIV_AUDIT) to provide an untrusted path which can lead to run resources that are not under the application’s direct control. Dell Technologies Dell PowerScale OneFS is an operating system of Dell Technologies in the United States. Offers the PowerScale OneFS operating system for scale-out NAS. Dell EMC PowerScale OneFS has a code issue vulnerability that allows a user (ISI PRIV LOGIN SSH or ISI PRIV LOGIN CONSOLE) and (ISI PRIV SYS UPGRADE or ISI PRIV AUDIT) to provide an untrusted path that could lead to applications not running directly resources under control
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emc powerscale onefs", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "9.1.0.0" }, { "model": "emc powerscale onefs", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "8.1.3" }, { "model": "emc powerscale onefs", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "9.0.0.0" }, { "model": "emc powerscale onefs", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "8.1.2" }, { "model": "emc powerscale onefs", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30eb", "version": null }, { "model": "emc powerscale onefs", "scope": "eq", "trust": 0.8, "vendor": "\u30c7\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dell:emc_powerscale_onefs:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dell:emc_powerscale_onefs:8.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dell:emc_powerscale_onefs:9.0.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dell:emc_powerscale_onefs:9.1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-21562" } ] }, "cve": "CVE-2021-21562", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-21562", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-379966", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "None", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-009396", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-21562", "trust": 1.8, "value": "MEDIUM" }, { "author": "security_alert@emc.com", "id": "CVE-2021-21562", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-129", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-379966", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-21562", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-379966" }, { "db": "VULMON", "id": "CVE-2021-21562" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell EMC PowerScale OneFS contains an untrusted search path vulnerability. This vulnerability allows a user with (ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE) and (ISI_PRIV_SYS_UPGRADE or ISI_PRIV_AUDIT) to provide an untrusted path which can lead to run resources that are not under the application\u2019s direct control. Dell Technologies Dell PowerScale OneFS is an operating system of Dell Technologies in the United States. Offers the PowerScale OneFS operating system for scale-out NAS. Dell EMC PowerScale OneFS has a code issue vulnerability that allows a user (ISI PRIV LOGIN SSH or ISI PRIV LOGIN CONSOLE) and (ISI PRIV SYS UPGRADE or ISI PRIV AUDIT) to provide an untrusted path that could lead to applications not running directly resources under control", "sources": [ { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "VULHUB", "id": "VHN-379966" }, { "db": "VULMON", "id": "CVE-2021-21562" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-21562", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009396", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-129", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-379966", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-21562", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-379966" }, { "db": "VULMON", "id": "CVE-2021-21562" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "id": "VAR-202108-0399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-379966" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:45.602000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-2021-097", "trust": 0.8, "url": "https://www.dell.com/support/kbdoc/ja-jp/000188148/dell-powerscale-onefs-security-update-for-multiple-security-vulnerabilities" }, { "title": "Dell Technologies Dell PowerScale OneFS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=158477" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-426", "trust": 1.1 }, { "problemtype": "Untrusted search path (CWE-426) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-379966" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.dell.com/support/kbdoc/000188148" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21562" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/426.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-379966" }, { "db": "VULMON", "id": "CVE-2021-21562" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-379966" }, { "db": "VULMON", "id": "CVE-2021-21562" }, { "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "db": "NVD", "id": "CVE-2021-21562" }, { "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-379966" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-21562" }, { "date": "2022-04-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "date": "2021-08-03T00:15:08.263000", "db": "NVD", "id": "CVE-2021-21562" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-379966" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-21562" }, { "date": "2022-04-25T09:19:00", "db": "JVNDB", "id": "JVNDB-2021-009396" }, { "date": "2021-08-11T18:27:01.230000", "db": "NVD", "id": "CVE-2021-21562" }, { "date": "2021-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell\u00a0PowerScale\u00a0OneFS\u00a0 Untrusted search path vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009396" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-129" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.