Vulnerability Description
An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the writing of arbitrary files to a user-controlled location on the remote filesystem (with user-controlled content) via directory traversal, potentially leading to remote code and command execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jump-Technology | Asset Management | 3.6.0.04.009-2487 |
Related Weaknesses (CWE)
References
- https://cds.thalesgroup.com/en/tcs-cert/CVE-2021-32016
- https://excellium-services.com/cert-xlm-advisory/cve-2021-32016/Third Party Advisory
- https://excellium-services.com/cert-xlm-advisory/cve-2021-32016/Third Party Advisory
FAQ
What is CVE-2021-32016?
CVE-2021-32016 is a vulnerability with a CVSS score of 9.9 (CRITICAL). An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the writing of arbitrary files to a user-controlled location on the remote filesystem (with user-controlled conten...
How severe is CVE-2021-32016?
CVE-2021-32016 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-32016?
Check the references section above for vendor advisories and patch information. Affected products include: Jump-Technology Asset Management.