CVE Vulnerabilities

CVE-2021-22191

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Mar 15, 2021 | Modified: May 27, 2022
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Wireshark Wireshark 3.2.0 (including) 3.2.11 (including)
Wireshark Wireshark 3.4.0 (including) 3.4.3 (including)
Wireshark Ubuntu bionic *
Wireshark Ubuntu groovy *
Wireshark Ubuntu trusty *
Wireshark Ubuntu trusty/esm *
Wireshark Ubuntu upstream *
Wireshark Ubuntu xenial *

Potential Mitigations

References