First published: Thu Sep 09 2021(Updated: )
Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a sandbox escape vulnerability may lead to post-authentication Remote Code execution. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Keti |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32835 is a sandbox escape vulnerability in Eclipse Keti, which can lead to post-authentication Remote Code Execution.
Eclipse Keti is a service designed to protect RESTful APIs using Attribute Based Access Control (ABAC).
CVE-2021-32835 has a severity rating of 9.9 out of 10, making it a critical vulnerability.
Eclipse Keti versions are affected by CVE-2021-32835.
CVE-2021-32835 can be exploited by an attacker to perform post-authentication Remote Code Execution.