ID

VAR-202205-0752


CVE

CVE-2021-30361


TITLE

Check Point Gaia Portal Operating system command injection vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202205-2954

DESCRIPTION

The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS

Trust: 1.08

sources: NVD: CVE-2021-30361 // VULHUB: VHN-390039 // VULMON: CVE-2021-30361

AFFECTED PRODUCTS

vendor:checkpointmodel:gaia portalscope:ltversion:2022-04-13

Trust: 1.0

vendor:checkpointmodel:gaia osscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2021-30361

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30361
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202205-2954
value: MEDIUM

Trust: 0.6

VULHUB: VHN-390039
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-30361
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-390039
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30361
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-390039 // CNNVD: CNNVD-202205-2954 // NVD: CVE-2021-30361

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-390039 // NVD: CVE-2021-30361

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-2954

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202205-2954

PATCH

title:Check Point Gaia Portal Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194055

Trust: 0.6

sources: CNNVD: CNNVD-202205-2954

EXTERNAL IDS

db:NVDid:CVE-2021-30361

Trust: 1.8

db:CNNVDid:CNNVD-202205-2954

Trust: 0.6

db:VULHUBid:VHN-390039

Trust: 0.1

db:VULMONid:CVE-2021-30361

Trust: 0.1

sources: VULHUB: VHN-390039 // VULMON: CVE-2021-30361 // CNNVD: CNNVD-202205-2954 // NVD: CVE-2021-30361

REFERENCES

url:https://supportcontent.checkpoint.com/solutions?id=sk179128

Trust: 1.8

url:https://cxsecurity.com/cveshow/cve-2021-30361/

Trust: 0.6

url:https://vigilance.fr/vulnerability/check-point-gaia-code-execution-via-portal-38331

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-390039 // VULMON: CVE-2021-30361 // CNNVD: CNNVD-202205-2954 // NVD: CVE-2021-30361

SOURCES

db:VULHUBid:VHN-390039
db:VULMONid:CVE-2021-30361
db:CNNVDid:CNNVD-202205-2954
db:NVDid:CVE-2021-30361

LAST UPDATE DATE

2024-08-14T15:21:49.752000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390039date:2022-05-25T00:00:00
db:VULMONid:CVE-2021-30361date:2022-05-11T00:00:00
db:CNNVDid:CNNVD-202205-2954date:2022-05-26T00:00:00
db:NVDid:CVE-2021-30361date:2022-05-25T14:20:02.910

SOURCES RELEASE DATE

db:VULHUBid:VHN-390039date:2022-05-11T00:00:00
db:VULMONid:CVE-2021-30361date:2022-05-11T00:00:00
db:CNNVDid:CNNVD-202205-2954date:2022-05-11T00:00:00
db:NVDid:CVE-2021-30361date:2022-05-11T17:15:08.833