Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41110
HistoryOct 01, 2021 - 12:20 p.m.

CVE-2021-41110 CWL Viewer: deserialization of untrusted data can lead to complete takeover by an attacker

2021-10-0112:20:11
CWE-502
GitHub_M
www.cve.org

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

9.5 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%

cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a patch. There are no available workarounds aside from installing the patch. The SnakeYaml constructor, by default, allows any data to be parsed. To fix the issue the object needs to be created with a SafeConstructor object, as seen in the patch.

CNA Affected

[
  {
    "product": "cwlviewer",
    "vendor": "common-workflow-language",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.3.1"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

9.5 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%

Related for CVELIST:CVE-2021-41110