Executive Summary

Informations
Name CVE-2021-32773 First vendor Publication 2021-07-20
Vendor Cve Last vendor Modification 2021-07-29

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact High Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32773

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-610 Externally Controlled Reference to a Resource in Another Sphere

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Sources (Detail)

Source Url
CONFIRM https://github.com/racket/racket/security/advisories/GHSA-cgrw-p7p7-937c
MISC https://github.com/racket/racket/commit/6ca4ffeca1e5877d44f835760ad89f18488d97e1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2021-07-29 21:23:19
  • Multiple Updates
2021-07-21 01:42:20
  • Multiple Updates
2021-07-21 01:42:09
  • Multiple Updates
2021-07-20 17:22:47
  • Multiple Updates
2021-07-20 09:22:51
  • First insertion