8.8
CVSSv3

CVE-2021-39172

Published: 27/08/2021 Updated: 13/12/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

catchethq catchet

Github Repositories

Cachet 2.4 Code Execution via Laravel Configuration Injection CVE-2021-39172

CVE-2021-39172 Cachet 24: Code Execution via Laravel Configuration Injection blog post about the vulnerability blogsonarsourcecom/cachet-code-execution-via-laravel-configuration-injection/ you can use this for ctf or just for learning have fun and May God bless you all