NYUCCL psiTurk up to 3.2.0 psiturk/experiment.py mode special elements used in a template engine

A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. Using CWE to declare the problem leads to CWE-1336. The weakness was released 01/27/2023 as 517. The advisory is shared for download at github.com. This vulnerability was named CVE-2021-4315. The attack can only be initiated within the local network. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1221. It is declared as proof-of-concept. It is possible to download the exploit at github.com. As 0-day the estimated underground price was around $0-$5k. Upgrading to version 3.2.1 is able to address this issue. The updated version is ready for download at github.com. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. The bugfix is ready for download at github.com. It is recommended to upgrade the affected component. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Field01/27/2023 23:4702/23/2023 18:1802/23/2023 18:25
patch_name47787e15cecd66f2aa87687bf852ae0194a4335f47787e15cecd66f2aa87687bf852ae0194a4335f47787e15cecd66f2aa87687bf852ae0194a4335f
patch_urlhttps://github.com/NYUCCL/psiTurk/commit/47787e15cecd66f2aa87687bf852ae0194a4335fhttps://github.com/NYUCCL/psiTurk/commit/47787e15cecd66f2aa87687bf852ae0194a4335fhttps://github.com/NYUCCL/psiTurk/commit/47787e15cecd66f2aa87687bf852ae0194a4335f
advisoryquoteFixed an issue where users could pass arbitrary Python code to be executed on the server to the mode HTTP argFixed an issue where users could pass arbitrary Python code to be executed on the server to the mode HTTP argFixed an issue where users could pass arbitrary Python code to be executed on the server to the mode HTTP arg
cveCVE-2021-4315CVE-2021-4315CVE-2021-4315
responsibleVulDBVulDBVulDB
date1674774000 (01/27/2023)1674774000 (01/27/2023)1674774000 (01/27/2023)
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss2_vuldb_basescore5.25.25.2
cvss2_vuldb_tempscore4.14.14.1
cvss3_vuldb_basescore5.55.55.5
cvss3_vuldb_tempscore5.05.05.0
cvss3_meta_basescore5.55.56.6
cvss3_meta_tempscore5.05.06.4
price_0day$0-$5k$0-$5k$0-$5k
vendorNYUCCLNYUCCLNYUCCL
namepsiTurkpsiTurkpsiTurk
version<=3.2.0<=3.2.0<=3.2.0
filepsiturk/experiment.pypsiturk/experiment.pypsiturk/experiment.py
argumentmodemodemode
cwe1336 (improper neutralization of special elements used in a template engine)1336 (improper neutralization of special elements used in a template engine)1336 (improper neutralization of special elements used in a template engine)
risk222
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
identifier517517517
urlhttps://github.com/NYUCCL/psiTurk/pull/517https://github.com/NYUCCL/psiTurk/pull/517https://github.com/NYUCCL/psiTurk/pull/517
availability111
publicity111
urlhttps://github.com/NYUCCL/psiTurk/pull/517https://github.com/NYUCCL/psiTurk/pull/517https://github.com/NYUCCL/psiTurk/pull/517
nameUpgradeUpgradeUpgrade
upgrade_version3.2.13.2.13.2.1
upgrade_urlhttps://github.com/NYUCCL/psiTurk/releases/tag/v3.2.1https://github.com/NYUCCL/psiTurk/releases/tag/v3.2.1https://github.com/NYUCCL/psiTurk/releases/tag/v3.2.1
cve_assigned1674774000 (01/27/2023)1674774000 (01/27/2023)
cve_nvd_summaryA vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore5.2
cvss3_nvd_basescore8.8
cvss3_cna_basescore5.5

Interested in the pricing of exploits?

See the underground prices here!