Vulnerability Description
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Octobot | Octobot | < 0.4.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-CoExploitThird Party Advisory
- https://github.com/Drakkar-Software/OctoBot/blob/master/CHANGELOG.mdThird Party Advisory
- https://github.com/Drakkar-Software/OctoBot/issues/1966ExploitThird Party Advisory
- https://github.com/Nwqda/Sashimi-Evil-OctoBot-TentacleExploitThird Party Advisory
- https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.htmlThird Party AdvisoryVDB Entry
- https://www.octobot.online/Vendor Advisory
- http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-CoExploitThird Party Advisory
- https://github.com/Drakkar-Software/OctoBot/blob/master/CHANGELOG.mdThird Party Advisory
- https://github.com/Drakkar-Software/OctoBot/issues/1966ExploitThird Party Advisory
- https://github.com/Nwqda/Sashimi-Evil-OctoBot-TentacleExploitThird Party Advisory
- https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.htmlThird Party AdvisoryVDB Entry
- https://www.octobot.online/Vendor Advisory
FAQ
What is CVE-2021-36711?
CVE-2021-36711 is a vulnerability with a CVSS score of 9.8 (CRITICAL). WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
How severe is CVE-2021-36711?
CVE-2021-36711 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-36711?
Check the references section above for vendor advisories and patch information. Affected products include: Octobot Octobot.