Miggo Logo

CVE-2021-21360:
Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.63335%
Published
3/9/2021
Updated
10/21/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Products.GenericSetuppip< 2.1.12.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper access control on files/folders created by GenericSetup. The commit 7003195 explicitly adds permission checks in these functions, restricting 'View' to Manager/Owner and disabling role acquisition. The workaround instructions also target these permission settings in ZMI, confirming these functions' role in the exposure.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ In*orm*tion *is*losur* vuln*r**ility - *nonymous visitors m*y vi*w lo* *n* sn*ps*ot *il*s **n*r*t** *y t** **n*ri* S*tup Tool. ### P*t***s _**s t** pro*l*m ***n p*t****? W**t v*rsions

Reasoning

T** vuln*r**ility st*ms *rom improp*r ****ss *ontrol on *il*s/*ol**rs *r**t** *y **n*ri*S*tup. T** *ommit ******* *xpli*itly ***s p*rmission ****ks in t**s* *un*tions, r*stri*tin* 'Vi*w' to M*n***r/Own*r *n* *is**lin* rol* **quisition. T** work*roun*