VulnerAlert



MICROSOFT
24-02-2026 14:27

CVE-2021-24105 Vulnerabilidad documentada

Sin puntuación
Tags
#cross
#tools
#test
#servers
#server
#python
#product
#machine
#javascript
#java
#give
#config
#advanced
#add
#microsoft
#vulnerability
#systems
#develop
#apple
#vulnerable
#remote
#malicious
#issue
#execution
#error
#discover
#detected
#configuration
#attack
#affect
Descripción

Depending on configuration of various package managers it is possible for an attacker to insert a malicious into manager's repository which can be retrieved and used during development, build, release processes. This insertion could lead remote code execution. We believe this vulnerability affects multiple across languages, including but not limited to: Python/pip, .NET/NuGet, Java/Maven, JavaScript/npm.

Attack scenarios

An take advantage ecosystem-wide issue cause harm in variety ways. The original attack scenarios were discovered by Alex Birsan are detailed their whitepaper, Dependency' target='nuevo' class='_link'>https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610">Dependency Confusion: How I Hacked Into Apple, Microsoft Dozens Other Companies.

  • With basic knowledge the target ecosystems, create empty shell install scripts, give high version, publish public repository. Vulnerable victim machines will download higher version between private repositories attempt it. Due incompatibility probably error out upon import or compilation, making easier detect; however would have gained execution that point.

  • An advanced with some inside copy working package, (in itself install), then likely correctly, granting initial foothold persistence.

These two methods affect organizations at any these levels:

  • Developer machines
  • An entire team if uploaded repository
  • Continuous integration pipelines they pull packages test, and/or deploy stages
  • Customers, servers, production services has been detected

This only addressed reconfiguring installation tools workflows, correcting anything themselves. See FAQ section CVE guidance.

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24105
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24105
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2021-24105
Resultados similares
Coincidentes en almenos en 50% de los tags
10-03-2026
ZDI-26-185: Microsoft Windows GDI Bitmap Parsing Out-Of-Bound Read Information Disclosure Vulne...
Ver información
26-02-2026 CVE-2026-28215
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthent...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por