First published: Wed May 05 2021(Updated: )
MapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3 does not properly enforce the MS_MAP_NO_PATH and MS_MAP_PATTERN restrictions that are intended to control the locations from which a mapfile may be loaded (with MapServer CGI).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Osgeo Mapserver | <7.0.8 | |
Osgeo Mapserver | >=7.1.0<7.2.3 | |
Osgeo Mapserver | >=7.3.0<7.4.5 | |
Osgeo Mapserver | >=7.5.0<7.6.3 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32062 is a vulnerability in MapServer that allows unauthorized loading of mapfiles.
CVE-2021-32062 has a severity rating of 5.3 (medium).
CVE-2021-32062 affects MapServer versions before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3.
The impact of CVE-2021-32062 is that it allows unauthorized users to load mapfiles, potentially exposing sensitive information.
To fix CVE-2021-32062, upgrade to MapServer version 7.0.8, 7.2.3, 7.4.5, 7.6.3, or later.