Vulnerability Description
vpn-user-portal (aka eduVPN or Let's Connect!) before 2.3.14, as packaged for Debian 10, Debian 11, and Fedora, allows remote authenticated users to obtain OS filesystem access, because of the interaction of QR codes with an exec that uses the -r option. This can be leveraged to obtain additional VPN access.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eduvpn | Vpn-User-Portal | >= 2.3.2, < 2.3.14 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | - |
Related Weaknesses (CWE)
References
- https://list.surfnet.nl/pipermail/eduvpn-deploy/2021-September/000352.htmlMailing ListThird Party Advisory
- https://github.com/eduvpn/vpn-user-portal/releasesRelease NotesThird Party Advisory
- https://list.surfnet.nl/pipermail/eduvpn-deploy/2021-September/000352.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2021-41583?
CVE-2021-41583 is a vulnerability with a CVSS score of 6.5 (MEDIUM). vpn-user-portal (aka eduVPN or Let's Connect!) before 2.3.14, as packaged for Debian 10, Debian 11, and Fedora, allows remote authenticated users to obtain OS filesystem access, because of the interac...
How severe is CVE-2021-41583?
CVE-2021-41583 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41583?
Check the references section above for vendor advisories and patch information. Affected products include: Eduvpn Vpn-User-Portal, Debian Debian Linux, Fedoraproject Fedora.