Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-29462
HistoryApr 20, 2021 - 9:10 p.m.

CVE-2021-29462 DNS rebinding in pupnp

2021-04-2021:10:13
CWE-20
GitHub_M
www.cve.org
4
upnp sdk
dns rebinding
libupnp
vulnerability
dns resolver
version 1.14.6

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

68.6%

The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the Host header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later.

CNA Affected

[
  {
    "product": "pupnp",
    "vendor": "pupnp",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.14.6"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

68.6%