A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245 Exploit Technical Description Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2021-03-25T16:01:12

Updated: 2022-02-07T14:41:27

Reserved: 2021-01-04T00:00:00


Link: CVE-2021-21783

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-03-25T17:15:13.210

Modified: 2022-07-21T11:04:11.417


Link: CVE-2021-21783

JSON object: View

cve-icon Redhat Information

No data.