CERT-In Vulnerability Note
CIVN-2021-0380
Multiple Vulnerabilities in GOautodial
Original Issue Date:December 31, 2021
Severity Rating: HIGH
Software Affected
- GOautodial API prior to versionb951651
Overview
Multiple vulnerabilities have been reported in GOautodial which could allow a remote attacker to execute arbitrary code or obtain sensitive information on the targeted system.
Description
1. Broken authentication vulnerability
(
CVE-2021-43175
)
This Vulnerability exists in GOautodial due to broken authentication flaw. An attacker could exploit this vulnerability by sending specially-crafted request to bypass access restrictions. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information such as default passwords from the targeted system.
2. Local file inclusion with path traversal vulnerability
(
CVE-2021-43176
)
This Vulnerability exists in GOautodial due to improper validation of file extensions. A remote attacker could exploit this vulnerability by sending specially-crafted HTTP request to execute arbitrary PHP code on the vulnerable system. Successful exploitation of this vulnerability could allow a remote authenticated attacker to execute arbitrary code or obtain sensitive information on the targeted system.
Solution
- Upgrade to Goautodial API 15a40bc or later
Vendor Information
GOautodial
https://goautodial.com/
References
https://www.synopsys.com/blogs/software-security/cyrc-advisory-goautodial-vulnerabilities/
https://github.com/goautodial/goAPIv2
CVE Name
CVE-2021-43175
CVE-2021-43176
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|