Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-40875
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-22 Sep, 2021 | 15:15
Updated At-12 Jul, 2022 | 17:42

Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

gurock
gurock
>>testrail>>Versions before 7.2.0.3014(exclusive)
cpe:2.3:a:gurock:testrail:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-425Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
https://github.com/SakuraSamuraii/derailedcve@mitre.org
Third Party Advisory
https://johnjhacking.com/blog/cve-2021-40875/cve@mitre.org
Exploit
Third Party Advisory
https://www.gurock.com/testrail/tour/enterprise-editioncve@mitre.org
Product
Vendor Advisory
Change History
0Changes found

Details not found