{"containers":{"cna":{"affected":[{"product":"SteelCentral AppInternals Dynamic Sampling Agent","vendor":"Aternity","versions":[{"status":"affected","version":"10.x"},{"lessThan":"12.13.0","status":"affected","version":"12.13.0","versionType":"custom"},{"lessThan":"11.8.8","status":"affected","version":"11.8.8","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"}],"datePublic":"2022-02-23T00:00:00.000Z","descriptions":[{"lang":"en","value":"It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-09T16:51:32.000Z","orgId":"1a37b84a-8e51-4525-b3d6-87e2fae01dbd","shortName":"GovTech CSG"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"}],"source":{"discovery":"INTERNAL"},"title":"Remote Code Execution at AgentControllerServlet","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve_disclosure@tech.gov.sg","DATE_PUBLIC":"2022-02-23T10:30:00.000Z","ID":"CVE-2021-42786","STATE":"PUBLIC","TITLE":"Remote Code Execution at AgentControllerServlet"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SteelCentral AppInternals Dynamic Sampling Agent","version":{"version_data":[{"version_affected":"<","version_name":"12.13.0","version_value":"12.13.0"},{"version_affected":"<","version_name":"11.8.8","version_value":"11.8.8"},{"version_affected":"=","version_name":"10.x","version_value":"10.x"}]}}]},"vendor_name":"Aternity"}]}},"credit":[{"lang":"eng","value":"Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786","refsource":"CONFIRM","url":"https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"}]},"source":{"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:38:50.184Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://aternity.force.com/customersuccess/s/article/Remote-Code-Execution-at-AgentControllerServlet-CVE-2021-42786"}]}]},"cveMetadata":{"assignerOrgId":"1a37b84a-8e51-4525-b3d6-87e2fae01dbd","assignerShortName":"GovTech CSG","cveId":"CVE-2021-42786","datePublished":"2022-03-09T16:51:32.667Z","dateReserved":"2021-10-21T00:00:00.000Z","dateUpdated":"2024-09-17T04:10:02.066Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}