FatPipe MPVPN < 10.1.2r60p92 / 10.2.2 < 10.2.2r44p1 Configuration File Upload (CVE-2021-27860)

high Nessus Plugin ID 176379

Synopsis

A web application running on the remote server is affected by a configuration file upload vulnerability.

Description

According to its self-reported version, the instance of FatPipe MPVPN running on the remote web server is < 10.1.2r60p92 or 10.2.2 < 10.2.2r44p1. It is, therefore, affected by a configuration file upload vulnerability that could allow a remote attacker to upload a file to any location on the filesystem on an affected device.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to FatPipe MPVPN 10.1.2r60p92 or 10.2.2r44p1 or later.

See Also

https://www.fatpipeinc.com/fpsa/fpsa006.php

Plugin Details

Severity: High

ID: 176379

File Name: fatpipe_mpvpn_10_2_2r44p1.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 5/25/2023

Updated: 5/26/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-27860

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fatpipeinc:mpvpn_firmware

Required KB Items: installed_sw/FatPipe MPVPN

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/8/2021

Vulnerability Publication Date: 12/8/2021

CISA Known Exploited Vulnerability Due Dates: 1/24/2022

Reference Information

CVE: CVE-2021-27860