{"vulnerability": "CVE-2021-2136", "sightings": [{"uuid": "cd7b2cca-5bb9-4625-8ac6-a671802eafd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21361", "type": "seen", "source": "https://t.me/cibsecurity/24585", "content": "\u203c CVE-2021-21361 \u203c\n\nThe `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T07:51:06.000000Z"}, {"uuid": "7eb6d0c9-7af4-49fc-a07d-3356185a0093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21366", "type": "seen", "source": "https://gist.github.com/Waddenn/8fbd3a7ec2387743ef3321e30acf45b4", "content": "", "creation_timestamp": "2025-05-27T13:08:52.000000Z"}, {"uuid": "e0f07dfa-8016-43fe-bd26-2982940e6b18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21362", "type": "seen", "source": "https://t.me/cibsecurity/24575", "content": "\u203c CVE-2021-21362 \u203c\n\nMinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-08T22:50:40.000000Z"}, {"uuid": "a01e4687-eb1e-4ca1-bb7c-ea7b8fbc2b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21360", "type": "seen", "source": "https://t.me/cibsecurity/24583", "content": "\u203c CVE-2021-21360 \u203c\n\nProducts.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `\"Products.GenericSetup&gt;=2.1.1\"`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T07:51:04.000000Z"}]}