CVE-2021-21783

Name
CVE-2021-21783
Description
A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245
MISC https://www.oracle.com/security-alerts/cpuoct2021.html
Patch https://www.oracle.com/security-alerts/cpujan2022.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:genivia:gsoap:2.8.107:*:*:*:*:*:*:* gsoap == None == 2.8.107

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
gsoap 3.13-community 2.8.113-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
gsoap 3.14-community 2.8.113-r0 Natanael Copa <ncopa@alpinelinux.org> fixed