Vulnerability Description
The ConfigFileAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to read arbitrary files via the ConfigName parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nsa | Emissary | 5.9.0 |
Related Weaknesses (CWE)
References
- https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealedExploitThird Party Advisory
- https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-ExploitThird Party Advisory
- https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealedExploitThird Party Advisory
- https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-ExploitThird Party Advisory
FAQ
What is CVE-2021-32093?
CVE-2021-32093 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The ConfigFileAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to read arbitrary files via the ConfigName parameter.
How severe is CVE-2021-32093?
CVE-2021-32093 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32093?
Check the references section above for vendor advisories and patch information. Affected products include: Nsa Emissary.