Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yeDI4LWM3ajctMjNnds4AA26P
Subrion remote command execution vulnerability
Subrion 4.2.1 has a remote command execution vulnerability in the backend.
Permalink: https://github.com/advisories/GHSA-2x28-c7j7-23gvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yeDI4LWM3ajctMjNnds4AA26P
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00152
EPSS Percentile: 0.52501
Identifiers: GHSA-2x28-c7j7-23gv, CVE-2023-46947
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-46947
- https://github.com/intelliants/subrion/issues/909
- https://github.com/advisories/GHSA-2x28-c7j7-23gv
Blast Radius: 4.3
Affected Packages
packagist:intelliants/subrion
Dependent packages: 0Dependent repositories: 4
Downloads: 129 total
Affected Version Ranges: <= 4.2.1
No known fixed version
All affected versions: 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.2.0, 4.2.1