First published: Fri Sep 17 2021(Updated: )
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Misp Misp | <2.4.148 | |
<2.4.148 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-41326 is critical with a CVSS score of 9.8.
CVE-2021-41326 affects MISP versions before 2.4.148.
The vulnerability in MISP is a command injection vulnerability in the app/Lib/Export/OpendataExport.php file.
To fix CVE-2021-41326 in MISP, you should update to version 2.4.148 or later.
You can find more information about CVE-2021-41326 in the references provided: [GitHub Commit](https://github.com/MISP/MISP/commit/e36f73947e741bc97320f0c42199acd1a94c7051), [GitHub Comparison](https://github.com/MISP/MISP/compare/v2.4.147...v2.4.148), [Advisory](https://zigrin.com/advisories/misp-command-injection-vulnerability-in-opendata-export/).