First published: Wed Jul 27 2022(Updated: )
VISAM VBASE version 11.6.0.6 processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE | =11.6.0.6 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.6.0.6 |
VISAM recommends users update to VBASE v11.7.0.2 or later. Users may obtain a download link by submitting a request form. For more information, please contact VISAM using the information provided on the company contact page.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42537 is classified as a medium severity vulnerability due to its potential to expose the system to the inclusion of incorrect external documents.
To mitigate CVE-2021-42537, it is recommended to patch the affected software to the latest version that addresses this vulnerability.
The potential impacts of CVE-2021-42537 include the unintentional embedding of unauthorized documents in outputs, which could leak sensitive information.
CVE-2021-42537 affects Visam Vbase version 11.6.0.6 specifically.
Currently, there are no known workarounds for CVE-2021-42537, making software updates the primary method of remediation.