CVE-2021-40978
high-risk
Published 2021-10-07
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
Do I need to act?
!
84.8% chance of exploitation in next 30 days
EPSS score — higher than 15% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://github.com/mkdocs/mkdocs
Issue Tracking
https://github.com/mkdocs/mkdocs/issues/2601
Issue Tracking
https://github.com/nisdn/CVE-2021-40978/issues/1
Third Party Advisory
https://github.com/mkdocs/mkdocs
Issue Tracking
https://github.com/mkdocs/mkdocs/issues/2601
Issue Tracking
https://github.com/nisdn/CVE-2021-40978/issues/1
51
/ 100
high-risk
Severity
26/34 · High
Exploitability
20/34 · Moderate
Exposure
5/34 · Minimal