First published: Mon May 24 2021(Updated: )
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnome Gupnp | <1.0.7 | |
Gnome Gupnp | >=1.1.0<1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33516 is a vulnerability in GUPnP library that allows DNS rebinding, enabling a remote web server to trick a victim's browser into triggering actions against local UPnP services.
The severity of CVE-2021-33516 is high, with a CVSS score of 8.1.
GUPnP versions before 1.0.7, 1.1.x, and 1.2.x before 1.2.5 are affected by CVE-2021-33516.
A remote web server can exploit CVE-2021-33516 to trick a victim's browser into triggering actions against local UPnP services implemented using the GUPnP library.
More information about CVE-2021-33516 can be found at the following references: - [Discourse GNOME](https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536) - [GitLab GNOME](https://gitlab.gnome.org/GNOME/gupnp/-/issues/24)