CVE-2021-44529

A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:-:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://forums.ivanti.com/s/article/SA-2021-12-02 - Mitigation, Patch, Vendor Advisory () https://forums.ivanti.com/s/article/SA-2021-12-02 - Mitigation, Patch, Vendor Advisory

Information

Published : 2021-12-08 22:15

Updated : 2025-03-13 19:55


NVD link : CVE-2021-44529

Mitre link : CVE-2021-44529

CVE.ORG link : CVE-2021-44529


JSON object : View

Products Affected

ivanti

  • endpoint_manager_cloud_services_appliance
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')