HomeUmbracoCVE-2021-37334

CVE-2021-37334

CRITICAL
9.8CVSS
Published: 2021-08-25
Updated: 2024-11-21
AI Analysis

Description

Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
NVD-CWE-noinfo

Metadata

Primary Vendor
UMBRACO
Published
8/25/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

umbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : formsumbraco : forms

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-37334 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com