ID

VAR-202107-0370


CVE

CVE-2021-22440


TITLE

plural  Huawei  Path traversal vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2021-009235

DESCRIPTION

There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1). Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.25

sources: NVD: CVE-2021-22440 // JVNDB: JVNDB-2021-009235 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-22440

AFFECTED PRODUCTS

vendor:huaweimodel:tony-al00bscope:eqversion:9.1.0.257\(c00e222r2p1\)

Trust: 1.0

vendor:huaweimodel:oxfords-an00ascope:eqversion:10.1.0.223\(c00e210r5p1\)

Trust: 1.0

vendor:huaweimodel:mate 20scope:eqversion:9.0.0.195\(c01e195r2p1\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.188\(c185e10r2p1\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.267\(c636e10r2p1\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.266\(c432e10r1p16\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.187\(c432e10r1p16\)

Trust: 1.0

vendor:huaweimodel:hima-l29cscope:eqversion:9.0.0.105\(c636e9r1p16\)

Trust: 1.0

vendor:huaweimodel:hima-l29cscope:eqversion:9.0.0.105\(c185e9r1p16\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.268\(c635e12r1p16\)

Trust: 1.0

vendor:huaweimodel:laya-al00epscope:eqversion:9.1.0.139\(c786e133r3p1\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.278\(c185e10r2p1\)

Trust: 1.0

vendor:huaweimodel:hima-l29cscope:eqversion:9.0.0.105\(c10e9r1p16\)

Trust: 1.0

vendor:huaweimodel:mate 20scope:eqversion:9.1.0.139\(c00e133r3p1\)

Trust: 1.0

vendor:huaweimodel:mate 20 proscope:eqversion:9.0.0.245\(c10e10r2p1\)

Trust: 1.0

vendor:huaweimodel:laya-al00epscope: - version: -

Trust: 0.8

vendor:huaweimodel:hima-l29cscope: - version: -

Trust: 0.8

vendor:huaweimodel:mate 20 proscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-009235 // NVD: CVE-2021-22440

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-22440
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-22440
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202106-2021
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-22440
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-22440
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-22440
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-22440
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-22440 // JVNDB: JVNDB-2021-009235 // CNNVD: CNNVD-202106-2021 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-22440

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-009235 // NVD: CVE-2021-22440

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202106-2021

PATCH

title:huawei-sa-20210630-01-pathtraversalurl:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en

Trust: 0.8

sources: JVNDB: JVNDB-2021-009235

EXTERNAL IDS

db:NVDid:CVE-2021-22440

Trust: 3.3

db:JVNDBid:JVNDB-2021-009235

Trust: 0.8

db:CS-HELPid:SB2021070201

Trust: 0.6

db:CNNVDid:CNNVD-202106-2021

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:VULMONid:CVE-2021-22440

Trust: 0.1

sources: VULMON: CVE-2021-22440 // JVNDB: JVNDB-2021-009235 // CNNVD: CNNVD-202106-2021 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-22440

REFERENCES

url:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-22440

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021070201

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-cn

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-22440 // JVNDB: JVNDB-2021-009235 // CNNVD: CNNVD-202106-2021 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-22440

CREDITS

The vulnerability was discovered by an external researcher

Trust: 0.6

sources: CNNVD: CNNVD-202106-2021

SOURCES

db:VULMONid:CVE-2021-22440
db:JVNDBid:JVNDB-2021-009235
db:CNNVDid:CNNVD-202106-2021
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-22440

LAST UPDATE DATE

2024-08-14T12:51:07.887000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-22440date:2021-07-15T00:00:00
db:JVNDBid:JVNDB-2021-009235date:2022-04-18T07:03:00
db:CNNVDid:CNNVD-202106-2021date:2021-07-16T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-22440date:2021-07-15T22:28:16.663

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-22440date:2021-07-13T00:00:00
db:JVNDBid:JVNDB-2021-009235date:2022-04-18T00:00:00
db:CNNVDid:CNNVD-202106-2021date:2021-06-30T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-22440date:2021-07-13T12:15:09.847