Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-32642
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Missing input validation in dynamic discovery example scripts.
Source: NVD (National Vulnerability Database)
Vulnerability Description
radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master branch and 1.9 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually. The dyndisc scripts work independently of the radsecproxy code. The updated scripts can be used with any version of radsecproxy.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Radsecproxy 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Radsecproxy是一个通用的 RADIUS 代理,支持 UDP 和 TLS (RadSec) RADIUS 传输。 Radsecproxy 1.9之前版本中存在注入漏洞,该漏洞源于在 naptr-eduroam.sh 和 radsec-dynsrv.sh 脚本中缺少输入验证,可能导致通过手工的radsec对等发现DNS记录进行配置注入,攻击者可通过该漏洞引发信息泄露、拒绝服务、Radius连接重定向到未经认证的服务器导致未经认证的网络访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
radsecproxyradsecproxy < 1.9.0 -
II. Public POCs for CVE-2021-32642
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-32642
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-32642

No comments yet


Leave a comment