{ "schema_version": "1.4.0", "id": "GHSA-x6vm-c7h3-mg2x", "modified": "2022-07-13T00:01:49Z", "published": "2022-01-21T00:00:52Z", "aliases": [ "CVE-2021-43269" ], "details": "In Code42 app before 8.8.0, eval injection allows an attacker to change a device’s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cloud; and CrashPlan for Small Business. (Incydr Professional and Enterprise are unaffected.)", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43269" }, { "type": "WEB", "url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Arbitrary_code_execution_via_malicious_Code42_app_proxy_configuration" }, { "type": "WEB", "url": "https://www.code42.com/r/support/CVE-2021-43269" } ], "database_specific": { "cwe_ids": [ "CWE-74" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-20T02:15:00Z" } }