Vulnerability Details CVE-2021-33359
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.6%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-33359
-
cpe:2.3:a:sensepost:gowitness:-
-
cpe:2.3:a:sensepost:gowitness:1.0.0
-
cpe:2.3:a:sensepost:gowitness:1.0.1
-
cpe:2.3:a:sensepost:gowitness:1.0.2
-
cpe:2.3:a:sensepost:gowitness:1.0.3
-
cpe:2.3:a:sensepost:gowitness:1.0.4
-
cpe:2.3:a:sensepost:gowitness:1.0.5
-
cpe:2.3:a:sensepost:gowitness:1.0.6
-
cpe:2.3:a:sensepost:gowitness:1.0.7
-
cpe:2.3:a:sensepost:gowitness:1.0.8
-
cpe:2.3:a:sensepost:gowitness:1.1.0
-
cpe:2.3:a:sensepost:gowitness:1.2.0
-
cpe:2.3:a:sensepost:gowitness:1.2.1
-
cpe:2.3:a:sensepost:gowitness:1.3.0
-
cpe:2.3:a:sensepost:gowitness:1.3.1
-
cpe:2.3:a:sensepost:gowitness:1.3.2
-
cpe:2.3:a:sensepost:gowitness:1.3.3
-
cpe:2.3:a:sensepost:gowitness:1.3.4
-
cpe:2.3:a:sensepost:gowitness:2.0.0
-
cpe:2.3:a:sensepost:gowitness:2.1.0
-
cpe:2.3:a:sensepost:gowitness:2.1.1
-
cpe:2.3:a:sensepost:gowitness:2.1.2
-
cpe:2.3:a:sensepost:gowitness:2.2.0
-
cpe:2.3:a:sensepost:gowitness:2.2.1
-
cpe:2.3:a:sensepost:gowitness:2.3.0
-
cpe:2.3:a:sensepost:gowitness:2.3.1
-
cpe:2.3:a:sensepost:gowitness:2.3.2
-
cpe:2.3:a:sensepost:gowitness:2.3.3
-
cpe:2.3:a:sensepost:gowitness:2.3.4
-
cpe:2.3:a:sensepost:gowitness:2.3.5