vulnerability
Rocky Linux: CVE-2021-33516: gupnp (RLSA-2021-2363)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | May 24, 2021 | May 5, 2022 | Aug 28, 2024 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
May 24, 2021
Added
May 5, 2022
Modified
Aug 28, 2024
Description
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Solution(s)
rocky-upgrade-gupnprocky-upgrade-gupnp-debuginforocky-upgrade-gupnp-debugsourcerocky-upgrade-gupnp-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.