vulnerability
SUSE: CVE-2021-33516: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | May 24, 2021 | Jun 19, 2021 | Oct 26, 2022 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
May 24, 2021
Added
Jun 19, 2021
Modified
Oct 26, 2022
Description
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Solutions
suse-upgrade-libgupnp-1_0-4suse-upgrade-libgupnp-1_2-0suse-upgrade-libgupnp-1_2-0-32bitsuse-upgrade-libgupnp-1_2-1suse-upgrade-libgupnp-develsuse-upgrade-typelib-1_0-gupnp-1_0
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.