Description
Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/camunda/camunda-modeler/issues/2143 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T21:40:12.134Z
Reserved: 2021-03-11T00:00:00.000Z
Link: CVE-2021-28154
No data.
Status : Modified
Published: 2021-03-11T22:15:12.857
Modified: 2024-11-21T05:59:11.987
Link: CVE-2021-28154
No data.
OpenCVE Enrichment
No data.
Weaknesses