CVE-2021-32634

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-32634
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32634.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-32634
Related
  • GHSA-m5qf-gfmp-7638
Published
2021-05-21T18:15:08Z
Modified
2025-01-08T10:43:49.239540Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Emissary is a distributed, peer-to-peer, data-driven workflow framework. Emissary 6.4.0 is vulnerable to Unsafe Deserialization of post-authenticated requests to the WorkSpaceClientEnqueue.action REST endpoint. This issue may lead to post-auth Remote Code Execution. This issue has been patched in version 6.5.0. As a workaround, one can disable network access to Emissary from untrusted sources.

References

Affected packages

Git / github.com/nationalsecurityagency/emissary

Affected ranges

Type
GIT
Repo
https://github.com/nationalsecurityagency/emissary
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

5.*

5.0.0
5.1.0
5.10.0
5.11.0
5.2.0
5.3.0
5.4.1
5.5.0
5.6.0
5.7.0
5.8.0
5.9.0

6.*

6.0.0
6.1.0
6.2.0
6.3.0
6.4.0
6.5.0