CVE-2021-46703

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-46703
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-46703.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-46703
Aliases
Withdrawn
2024-05-08T06:51:42.404866Z
Published
2022-03-06T06:15:07Z
Modified
2023-11-28T22:59:36.689253Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer

References

Affected packages

Git / github.com/antaris/razorengine

Affected ranges

Type
GIT
Repo
https://github.com/antaris/razorengine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*

3.10.0
3.5.0
3.5.0-beta1
3.5.0-beta2
3.5.0-beta3
3.5.1
3.5.2
3.5.3
3.6.0
3.6.1
3.6.2
3.6.3
3.6.3-beta1
3.6.4
3.6.5
3.6.6
3.7.0
3.7.0-beta1
3.7.1
3.7.1-alpha1
3.7.1-beta1
3.7.2
3.7.3
3.7.4
3.7.5
3.7.6
3.7.7
3.8.0
3.8.1
3.8.2
3.9.0
3.9.2

4.*

4.0.0-beta2
4.0.1-beta1
4.0.2-beta1
4.0.3-beta1
4.1.0-beta1
4.1.1-beta1
4.1.2-beta1
4.1.3-beta2
4.1.4-beta1
4.1.5-beta1
4.1.6-beta1
4.2.0-beta1
4.2.0-beta2
4.2.0-beta3
4.2.1-beta1
4.2.2-beta1
4.2.3-beta1
4.2.4-beta1
4.2.5-beta1
4.2.6-beta1
4.2.7-beta1
4.3.0-beta1
4.3.1-beta1
4.3.2-beta1
4.4.0-rc1
4.4.2-rc1
4.5.0-rc1

legacy-release-3.*

legacy-release-3.0

roslyn-3.*

roslyn-3.5.0-beta2
roslyn-3.5.1-beta1
roslyn-3.5.2-beta1
roslyn-3.5.2-beta2
roslyn-3.5.3-beta1
roslyn-3.5.4-beta1
roslyn-3.5.5-beta1
roslyn-3.6.0-rc1

roslyn-4.*

roslyn-4.0.0-beta1
roslyn-4.0.1-beta1
roslyn-4.0.2-beta1
roslyn-4.0.2-beta2
roslyn-4.0.3-beta1
roslyn-4.0.4-beta1
roslyn-4.0.5-beta1
roslyn-4.1.0-rc1