Vulnerability Description
OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attackers can submit a malicious HTTP POST request to PHP scripts in '/plugins/useradmin/' directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbmcs | Openbmcs | 2.4 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/50669ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/openbmcs-user-management-privilege-escalatiThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5693.phpExploitThird Party Advisory
FAQ
What is CVE-2021-47701?
CVE-2021-47701 is a vulnerability with a CVSS score of 8.8 (HIGH). OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attacker...
How severe is CVE-2021-47701?
CVE-2021-47701 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47701?
Check the references section above for vendor advisories and patch information. Affected products include: Openbmcs Openbmcs.