CVE-2021-4297: Privilege Escalation in trampgeek jobe
A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The patch is identified as 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2021-4297 is a medium severity privilege escalation vulnerability identified in the trampgeek jobe software, specifically affecting versions 1.6.0 through 1.6.4. The vulnerability resides in the runs_post function within the application/controllers/Restapi.php file. The issue arises due to improper handling or validation of the argument sourcefilename, which can be manipulated by an attacker to exploit an unknown weakness that leads to privilege escalation. This means an attacker with limited privileges could potentially elevate their access rights within the system, compromising confidentiality, integrity, and availability of the affected environment. The vulnerability is classified under CWE-276, which relates to improper privilege management. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. This means the attack requires adjacent network access, low attack complexity, and low privileges but no user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent. The vendor has addressed this issue in version 1.6.5, and upgrading to this version or later is recommended. No known exploits are currently reported in the wild, but the presence of a patch indicates the risk of exploitation if unpatched. The vulnerability's root cause is related to improper privilege assignment or validation, which could allow an attacker to gain unauthorized elevated privileges within the application environment.
Potential Impact
For European organizations using trampgeek jobe versions 1.6.0 to 1.6.4, this vulnerability poses a risk of privilege escalation, potentially allowing attackers to gain elevated access rights. This could lead to unauthorized access to sensitive data, modification or deletion of critical information, and disruption of services. Given that the attack vector requires adjacent network access and low privileges, internal threat actors or attackers who have gained limited access could exploit this vulnerability to expand their control. This is particularly concerning for organizations in sectors with strict data protection requirements such as finance, healthcare, and government, where unauthorized privilege escalation could lead to data breaches or operational disruptions. The medium severity rating suggests that while the impact is not critical, it is significant enough to warrant prompt remediation to prevent lateral movement or further compromise within the network.
Mitigation Recommendations
European organizations should prioritize upgrading trampgeek jobe to version 1.6.5 or later, where the vulnerability is patched. In addition to patching, organizations should implement strict network segmentation to limit adjacent network access to the application, reducing the attack surface. Access controls should be reviewed and tightened to ensure that users have the minimum necessary privileges, limiting the potential impact of privilege escalation. Monitoring and logging of access to the runs_post function and related API endpoints should be enhanced to detect anomalous activity indicative of exploitation attempts. Conducting regular security audits and code reviews of custom integrations with trampgeek jobe can help identify and remediate similar privilege management issues. Finally, organizations should ensure that internal users and administrators are trained to recognize and report suspicious behavior that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2021-4297: Privilege Escalation in trampgeek jobe
Description
A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The patch is identified as 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2021-4297 is a medium severity privilege escalation vulnerability identified in the trampgeek jobe software, specifically affecting versions 1.6.0 through 1.6.4. The vulnerability resides in the runs_post function within the application/controllers/Restapi.php file. The issue arises due to improper handling or validation of the argument sourcefilename, which can be manipulated by an attacker to exploit an unknown weakness that leads to privilege escalation. This means an attacker with limited privileges could potentially elevate their access rights within the system, compromising confidentiality, integrity, and availability of the affected environment. The vulnerability is classified under CWE-276, which relates to improper privilege management. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. This means the attack requires adjacent network access, low attack complexity, and low privileges but no user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent. The vendor has addressed this issue in version 1.6.5, and upgrading to this version or later is recommended. No known exploits are currently reported in the wild, but the presence of a patch indicates the risk of exploitation if unpatched. The vulnerability's root cause is related to improper privilege assignment or validation, which could allow an attacker to gain unauthorized elevated privileges within the application environment.
Potential Impact
For European organizations using trampgeek jobe versions 1.6.0 to 1.6.4, this vulnerability poses a risk of privilege escalation, potentially allowing attackers to gain elevated access rights. This could lead to unauthorized access to sensitive data, modification or deletion of critical information, and disruption of services. Given that the attack vector requires adjacent network access and low privileges, internal threat actors or attackers who have gained limited access could exploit this vulnerability to expand their control. This is particularly concerning for organizations in sectors with strict data protection requirements such as finance, healthcare, and government, where unauthorized privilege escalation could lead to data breaches or operational disruptions. The medium severity rating suggests that while the impact is not critical, it is significant enough to warrant prompt remediation to prevent lateral movement or further compromise within the network.
Mitigation Recommendations
European organizations should prioritize upgrading trampgeek jobe to version 1.6.5 or later, where the vulnerability is patched. In addition to patching, organizations should implement strict network segmentation to limit adjacent network access to the application, reducing the attack surface. Access controls should be reviewed and tightened to ensure that users have the minimum necessary privileges, limiting the potential impact of privilege escalation. Monitoring and logging of access to the runs_post function and related API endpoints should be enhanced to detect anomalous activity indicative of exploitation attempts. Conducting regular security audits and code reviews of custom integrations with trampgeek jobe can help identify and remediate similar privilege management issues. Finally, organizations should ensure that internal users and administrators are trained to recognize and report suspicious behavior that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-01-01T18:13:48.554Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68371692182aa0cae24f0c54
Added to database: 5/28/2025, 1:58:42 PM
Last enriched: 7/7/2025, 9:26:03 AM
Last updated: 8/14/2025, 1:49:24 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.