{"containers":{"cna":{"affected":[{"platforms":["Linux"],"product":"Lens","vendor":"Mirantis","versions":[{"lessThanOrEqual":"5.2.6","status":"affected","version":"5.2","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-287","description":"CWE-287 Improper Authentication","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-01-10T15:05:44.000Z","orgId":"ac17a704-eccd-4263-a802-5cee95c1d547","shortName":"Mirantis"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/Mirantis/security/blob/main/advisories/0001.md"}],"source":{"advisory":"0001","discovery":"INTERNAL"},"title":"Lack of websocket authentication in Lens causes remote code execution when visiting a malicious website","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@mirantis.com","ID":"CVE-2021-44458","STATE":"PUBLIC","TITLE":"Lack of websocket authentication in Lens causes remote code execution when visiting a malicious website"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Lens","version":{"version_data":[{"platform":"Linux","version_affected":"<=","version_name":"5.2","version_value":"5.2.6"}]}}]},"vendor_name":"Mirantis"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Linux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287 Improper Authentication"}]}]},"references":{"reference_data":[{"name":"https://github.com/Mirantis/security/blob/main/advisories/0001.md","refsource":"MISC","url":"https://github.com/Mirantis/security/blob/main/advisories/0001.md"}]},"source":{"advisory":"0001","discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T04:25:16.457Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/Mirantis/security/blob/main/advisories/0001.md"}]}]},"cveMetadata":{"assignerOrgId":"ac17a704-eccd-4263-a802-5cee95c1d547","assignerShortName":"Mirantis","cveId":"CVE-2021-44458","datePublished":"2022-01-10T15:05:44.000Z","dateReserved":"2022-01-10T00:00:00.000Z","dateUpdated":"2024-08-04T04:25:16.457Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}