7.5
CVSSv2

CVE-2021-29462

Published: 20/04/2021 Updated: 03/08/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the `Host` header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pupnp project pupnp

Vendor Advisories

Debian Bug report logs - #987326 pupnp-18: CVE-2021-29462 Package: src:pupnp-18; Maintainer for src:pupnp-18 is James Cowgill <jcowgill@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 21 Apr 2021 19:03:01 UTC Severity: important Tags: security, upstream Found in version pupnp-18/1:1 ...
The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the `Host` header This can be mitigated by using DNS revolvers which block DNS-rebinding attacks The vulnerability is fixed in version 1146 and later ...