Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-32773
HistoryJul 19, 2021 - 11:55 p.m.

CVE-2021-32773 Confused deputy attack in sandbox module resolution

2021-07-1923:55:11
CWE-441
GitHub_M
www.cve.org

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

32.5%

Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the handin-server system, it is not possible to work around this problem and upgrading is required.

CNA Affected

[
  {
    "product": "racket",
    "vendor": "racket",
    "versions": [
      {
        "status": "affected",
        "version": "< 8.2"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

32.5%