Vulnerabilities (CVE)

Filtered by vendor Nsa Subscribe
Filtered by product Emissary
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-32634 1 Nsa 1 Emissary 2021-05-27 6.5 MEDIUM 7.2 HIGH
Emissary is a distributed, peer-to-peer, data-driven workflow framework. Emissary 6.4.0 is vulnerable to Unsafe Deserialization of post-authenticated requests to the [`WorkSpaceClientEnqueue.action`](https://github.com/NationalSecurityAgency/emissary/blob/30c54ef16c6eb6ed09604a929939fb9f66868382/src/main/java/emissary/server/mvc/internal/WorkSpaceClientEnqueueAction.java) REST endpoint. This issue may lead to post-auth Remote Code Execution. This issue has been patched in version 6.5.0. As a workaround, one can disable network access to Emissary from untrusted sources.
CVE-2021-32096 1 Nsa 1 Emissary 2021-05-19 6.8 MEDIUM 8.8 HIGH
The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
CVE-2021-32094 1 Nsa 1 Emissary 2021-05-12 6.5 MEDIUM 8.8 HIGH
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
CVE-2021-32095 1 Nsa 1 Emissary 2021-05-12 5.5 MEDIUM 8.1 HIGH
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.