OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
References
| Link | Resource |
|---|---|
| http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4 | Broken Link Exploit Vendor Advisory |
| http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html | Exploit Third Party Advisory |
| https://youtu.be/k1teIStQr1A | Exploit Third Party Advisory |
| http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4 | Broken Link Exploit Vendor Advisory |
| http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html | Exploit Third Party Advisory |
| https://youtu.be/k1teIStQr1A | Exploit Third Party Advisory |
| https://github.com/SCADA-LTS/Scada-LTS/pull/2174 | Issue Tracking Patch |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-26828 | US Government Resource |
Configurations
History
No history.
Information
Published : 2021-06-11 12:15
Updated : 2025-12-04 14:47
NVD link : CVE-2021-26828
Mitre link : CVE-2021-26828
CVE.ORG link : CVE-2021-26828
JSON object : View
Products Affected
microsoft
- windows
linux
- linux_kernel
scadabr
- scadabr
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
