9.8 CVE-2021-27103

CISA Kev Catalog Used by Malware Used by Ransomware
 

Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later.
https://nvd.nist.gov/vuln/detail/CVE-2021-27103

Categories

CWE-918 : Server-Side Request Forgery (SSRF)
By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:accellion:fta:*:*:*:*:*:*:*:* <= 9_12_411


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
664 Server Side Request Forgery
High