CVE-2021-28122
Summary
| CVE | CVE-2021-28122 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-10 15:15:00 UTC |
| Updated | 2022-07-12 17:42:00 UTC |
| Description | A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication. |
Risk And Classification
Problem Types: CWE-306
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Authentication Bypass in Webui · Issue #837 · open5gs/open5gs · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| Add API tokens by rashley-iqt · Pull Request #838 · open5gs/open5gs · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Releases · open5gs/open5gs · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| Comparing v2.2.0...v2.2.1 · open5gs/open5gs · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.