Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3.
{"id": "CVE-2021-32644", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-32644", "description": "Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3.", "published": "2021-06-22T18:15:00", "modified": "2021-06-29T16:02:00", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5}, "severity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32644", "reporter": "security-advisories@github.com", "references": ["https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q", "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5"], "cvelist": ["CVE-2021-32644"], "immutableFields": [], "lastseen": "2022-03-23T18:30:46", "viewCount": 28, "enchantments": {"dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2021-0705"]}, {"type": "githubexploit", "idList": ["C06724A3-3997-554F-9133-DEDF1609D0B7"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-32644"]}], "rev": 4}, "score": {"value": 4.3, "vector": "NONE"}, "twitter": {"counter": 8, "tweets": [{"link": "https://twitter.com/WolfgangSesin/status/1409947493400559621", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-32644 (ampache)) has been published on https://t.co/vAUJmBAFtA?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1409947505886908420", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-32644 (ampache)) has been published on https://t.co/jS9BENKV9t?amp=1"}, {"link": "https://twitter.com/SecRiskRptSME/status/1407603453573148672", "text": "RT:\n\nCVE-2021-32644 Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication t... https://t.co/2vlHdCdVCN?amp=1\n\n\u2014 CV\u2026"}, {"link": "https://twitter.com/SecRiskRptSME/status/1407603453573148672", "text": "RT:\n\nCVE-2021-32644 Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication t... https://t.co/2vlHdCdVCN?amp=1\n\n\u2014 CV\u2026"}, {"link": "https://twitter.com/eyeTSystems/status/1407602425096200192", "text": "CVE-2021-32644 Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication t... https://t.co/YI5VUiO2Hn?amp=1"}, {"link": "https://twitter.com/eyeTSystems/status/1407602425096200192", "text": "CVE-2021-32644 Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication t... https://t.co/YI5VUiO2Hn?amp=1"}, {"link": "https://twitter.com/VulmonFeeds/status/1426365634150031363", "text": "CVE-2021-32644\n\nAmpache is an open source web based audio/video streaming applica...\n\nhttps://t.co/qw5lSPmpgF?amp=1\n\nVulnerability Alert Subscriptions: https://t.co/hrQhy5uz4x?amp=1"}, {"link": "https://twitter.com/Securityblog/status/1427184285547745283", "text": "GitHub - dnr6419/CVE-2021-32644: Ampache XSS"}], "modified": "2021-06-30T07:45:25"}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2021-0705"]}, {"type": "githubexploit", "idList": ["C06724A3-3997-554F-9133-DEDF1609D0B7"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-32644"]}]}, "exploitation": null, "vulnersScore": 4.3}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": "GitHub, Inc.", "cvss": {"3": {"vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "score": 6.4}}}, "cpe": ["cpe:/a:ampache:ampache:4.4.2"], "cpe23": ["cpe:2.3:a:ampache:ampache:4.4.2:*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "affectedSoftware": [{"cpeName": "ampache:ampache", "version": "4.4.2", "operator": "eq", "name": "ampache"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:ampache:ampache:4.4.2:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q", "name": "https://github.com/ampache/ampache/security/advisories/GHSA-vqpj-xgw2-r54q", "refsource": "CONFIRM", "tags": ["Third Party Advisory"]}, {"url": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5", "name": "https://github.com/ampache/ampache/commit/c9453841e1b517a1660c3da1efd1fe5d623c93a5", "refsource": "MISC", "tags": ["Patch", "Third Party Advisory"]}]}