EMC RSA Archer 6.0 < 6.9 SP3 P4 / 6.10 < 6.10 P2 Remote Code Execution

high Nessus Plugin ID 169673

Synopsis

An application running on the remote host is affected by a remote code execution vulnerability.

Description

The version of EMC RSA Archer running on the remote web server is 6.x prior to 6.9.3.4 (6.9 SP3 P4), 6.10.x prior to 6.10.0.2 (6.10 P2). It is, therefore, affected by a remote code execution vulnerability due to unrestricted upload of a file with a dangerous type. A remote, authenticated malicious user could potentially uplaod an ASP web shell to either of two endpoints IconUploadHandler.ashx and GraphicUploadHandler.ashx, allowing them to execute arbitrary code on the affected host.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update to 6.9 SP3 P4, 6.10 P2, 6.11 or later.

See Also

http://www.nessus.org/u?ea206367

http://www.nessus.org/u?dd5e4584

https://nvd.nist.gov/vuln/detail/CVE-2021-33615

Plugin Details

Severity: High

ID: 169673

File Name: emc_rsa_archer_CVE-2021-33615.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 1/6/2023

Updated: 1/9/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2021-33615

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:emc:rsa_archer_egrc

Exploit Ease: No known exploits are available

Patch Publication Date: 5/16/2022

Vulnerability Publication Date: 5/16/2022

Reference Information

CVE: CVE-2021-33615

CWE: 434