Vulnerability Name: | CVE-2021-32708 (CCN-204409) | ||||||||||||
Assigned: | 2021-06-23 | ||||||||||||
Published: | 2021-06-23 | ||||||||||||
Updated: | 2021-09-20 | ||||||||||||
Summary: | Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-367 CWE-367 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32708 Source: XF Type: UNKNOWN flysystem-cve202132708-code-exec(204409) Source: MISC Type: Patch, Third Party Advisory https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74 Source: MISC Type: Patch, Third Party Advisory https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32 Source: CCN Type: Flysystem GIT Repository Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-b9187c535c Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-717516a2e9 Source: MISC Type: Product, Third Party Advisory https://packagist.org/packages/league/flysystem Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-32708 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |