SB2021060709 - Remote code execution in Emissary



SB2021060709 - Remote code execution in Emissary

Published: June 7, 2021 Updated: April 7, 2026

Security Bulletin ID SB2021060709
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Code Injection (CVE-ID: CVE-2021-32647)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in the CreatePlace REST endpoint. A remote administrator can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2021-32639)

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to server-side request forgery in RegisterPeerAction and AddChildDirectoryAction endpoints when handling crafted POST requests. A remote privileged user can send a specially crafted request to disclose sensitive information.

Some forged requests are sent to attacker-controlled hosts, including authenticated requests to the /emissary/RegisterPeer.action endpoint and non-authenticated requests to the /emissary/Heartbeat.action endpoint.


Remediation

Install update from vendor's website.