First published: Mon Mar 01 2021(Updated: )
SRS Policy Manager 6.X is affected by an XML External Entity Injection (XXE) vulnerability due to a misconfigured XML parser that processes user-supplied DTD input without sufficient validation. A remote unauthenticated attacker can potentially exploit this vulnerability to read system files as a non-root user and may be able to temporarily disrupt the ESRS service.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC SRS Policy Manager | =6.6 | |
Dell EMC SRS Policy Manager | =6.8.3 | |
Dell EMC SRS Policy Manager | =6.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21517 is classified as a critical vulnerability due to its potential for remote exploitation and significant impact.
To fix CVE-2021-21517, update your Dell EMC SRS Policy Manager to version 6.6, 6.8.3, or 6.9.0 as recommended in the security update.
CVE-2021-21517 affects Dell EMC SRS Policy Manager versions 6.6, 6.8.3, and 6.9.0.
No, CVE-2021-21517 can be exploited by remote unauthenticated attackers.
CVE-2021-21517 allows a remote attacker to perform an XML External Entity Injection (XXE) attack to potentially read sensitive system files.