CVE Vulnerabilities

CVE-2021-33516

Published: May 24, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
8.3 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victims browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.

Affected Software

NameVendorStart VersionEnd Version
GupnpGnome*1.0.7 (excluding)
GupnpGnome1.1.0 (including)1.2.5 (excluding)
Red Hat Enterprise Linux 7RedHatgupnp-0:1.0.2-6.el7_9*
Red Hat Enterprise Linux 8RedHatgupnp-0:1.0.6-2.el8_4*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatgupnp-0:1.0.3-3.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatgupnp-0:1.0.3-3.el8_2*
GupnpUbuntubionic*
GupnpUbuntudevel*
GupnpUbuntuesm-infra/focal*
GupnpUbuntufocal*
GupnpUbuntugroovy*
GupnpUbuntuhirsute*
GupnpUbuntuimpish*
GupnpUbuntujammy*
GupnpUbuntukinetic*
GupnpUbuntulunar*
GupnpUbuntumantic*
GupnpUbuntunoble*
GupnpUbuntuoracular*
GupnpUbuntuplucky*
GupnpUbuntuquesting*
GupnpUbuntutrusty*
GupnpUbuntuxenial*

References