CVE-2021-42952

Zepl Notebooks before 2021-10-25 are affected by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services.
References
Link Resource
http://zepl.com Product Vendor Advisory
https://seclists.org/fulldisclosure/2022/Feb/32 Mailing List Third Party Advisory
http://zepl.com Product Vendor Advisory
https://seclists.org/fulldisclosure/2022/Feb/32 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zepl:zepl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () http://zepl.com - Product, Vendor Advisory () http://zepl.com - Product, Vendor Advisory
References () https://seclists.org/fulldisclosure/2022/Feb/32 - Mailing List, Third Party Advisory () https://seclists.org/fulldisclosure/2022/Feb/32 - Mailing List, Third Party Advisory

Information

Published : 2022-02-25 20:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-42952

Mitre link : CVE-2021-42952

CVE.ORG link : CVE-2021-42952


JSON object : View

Products Affected

zepl

  • zepl