Vulnerability Description
A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Any23 | < 2.5 |
References
- http://www.openwall.com/lists/oss-security/2021/09/11/2Mailing ListThird Party Advisory
- https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338Mailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2021/09/11/2Mailing ListThird Party Advisory
- https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338Mailing ListVendor Advisory
FAQ
What is CVE-2021-40146?
CVE-2021-40146 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any ...
How severe is CVE-2021-40146?
CVE-2021-40146 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-40146?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Any23.