From 27ce9929ed7d0822dc37bc1c84af77368dbb5c4d Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 5 May 2022 12:23:55 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-21479.yaml by mp --- cves/2021/CVE-2021-21479.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index b22cebd6c2..8a6a988e28 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -1,14 +1,15 @@ id: CVE-2021-21479 info: - name: SCIMono < v0.0.19 Remote Code Execution + name: SCIMono <0.0.19 - Remote Code Execution author: dwisiswant0 severity: critical description: | - In SCIMono before 0.0.19, it is possible for an attacker to inject and - execute java expression compromising the availability and integrity of the system. + SCIMono before 0.0.19 is vulnerable to remote code execution because it is possible for an attacker to inject and + execute java expressions and compromise the availability and integrity of the system. reference: - https://securitylab.github.com/advisories/GHSL-2020-227-scimono-ssti/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-21479 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H cvss-score: 9.1 @@ -30,3 +31,5 @@ requests: - '"status" : "400"' part: body condition: and + +# Enhanced by mp on 2022/05/05