An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victims browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gupnp | Gnome | * | 1.0.7 (excluding) |
Gupnp | Gnome | 1.1.0 (including) | 1.2.5 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | gupnp-0:1.0.2-6.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | gupnp-0:1.0.6-2.el8_4 | * |
Red Hat Enterprise Linux 8.1 Extended Update Support | RedHat | gupnp-0:1.0.3-3.el8_1 | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | gupnp-0:1.0.3-3.el8_2 | * |
Gupnp | Ubuntu | bionic | * |
Gupnp | Ubuntu | devel | * |
Gupnp | Ubuntu | focal | * |
Gupnp | Ubuntu | groovy | * |
Gupnp | Ubuntu | hirsute | * |
Gupnp | Ubuntu | impish | * |
Gupnp | Ubuntu | jammy | * |
Gupnp | Ubuntu | kinetic | * |
Gupnp | Ubuntu | lunar | * |
Gupnp | Ubuntu | mantic | * |
Gupnp | Ubuntu | noble | * |
Gupnp | Ubuntu | oracular | * |
Gupnp | Ubuntu | trusty | * |
Gupnp | Ubuntu | xenial | * |