CVE-2021-21783

Severity
9.8CRITICAL
EPSS
2.1%
top 16.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25
Latest updateOct 15

Description

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages7 packages

NVDgenivia/gsoap2.8.107
CVEListV5geniviaGenivia gSOAP 2.8.109, Genivia gSOAP 2.8.110

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pf2j-vqc7-8qr7: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22022-05-24
OSV
CVE-2021-21783: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22021-03-25
CVEList
CVE-2021-21783: A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 22021-03-25

📋Vendor Advisories

4
Oracle
Oracle Oracle Communications Risk Matrix: Platform (gSOAP) — CVE-2021-217832022-10-15
Oracle
Oracle Oracle Communications Risk Matrix: Platform (gSOAP) — CVE-2021-217832022-01-15
Oracle
Oracle Oracle Communications Risk Matrix: Platform (gSOAP) — CVE-2021-217832021-10-15
Debian
CVE-2021-21783: gsoap - A code execution vulnerability exists in the WS-Addressing plugin functionality ...2021