Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-42073
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-08 Nov, 2021 | 04:15
Updated At-13 Nov, 2023 | 22:15

An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

barrier_project
barrier_project
>>barrier>>Versions before 2.4.0(exclusive)
cpe:2.3:a:barrier_project:barrier:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-384Primarynvd@nist.gov
CWE ID: CWE-384
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2021/11/02/4cve@mitre.org
Exploit
Mailing List
Third Party Advisory
https://github.com/debauchee/barrier/commit/229abab99f39f11624e5651f819e7f1f8eddedcccve@mitre.org
N/A
https://github.com/debauchee/barrier/commit/b5adc93e2bd74cb094f91ff595c07f321a489f3ecve@mitre.org
N/A
https://github.com/debauchee/barrier/releases/tag/v2.4.0cve@mitre.org
Release Notes
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2021/11/02/4
Source: cve@mitre.org
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: https://github.com/debauchee/barrier/commit/229abab99f39f11624e5651f819e7f1f8eddedcc
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/debauchee/barrier/commit/b5adc93e2bd74cb094f91ff595c07f321a489f3e
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/debauchee/barrier/releases/tag/v2.4.0
Source: cve@mitre.org
Resource:
Release Notes
Third Party Advisory
Change History
0Changes found

Details not found