CVE-2021-47850
BaseFortify
Publication date: 2026-01-21
Last updated on: 2026-02-02
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yodinfo | mini_mouse | 9.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2021-47850 is a path traversal vulnerability in Mini Mouse version 9.2.0. It allows remote attackers to send specially crafted HTTP requests that manipulate file and path parameters to access arbitrary system files and directories. This means attackers can retrieve sensitive files like 'win.ini' and list contents of system directories such as 'C:\Users\Public' without authorization. [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive system files and directory contents. Attackers can access configuration files and potentially sensitive data stored on the system, which may lead to further attacks or information leakage. Because the vulnerability requires no privileges or user interaction, it can be exploited remotely over the network, increasing the risk to affected systems. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP requests to the Mini Mouse 9.2.0 application's web interface and observing if arbitrary files or directory listings are returned. For example, you can use curl commands to test the vulnerability: 1. To retrieve the contents of a sensitive file like win.ini: curl -i "http://<target-ip>/file=C:\Windows\win.ini" 2. To list contents of a directory such as C:\Users\Public: curl -X POST -H "Content-Type: application/json" -d '{"path":"C:\\Users\\Public"}' "http://<target-ip>/op=get_file_list" If the server responds with the file contents or directory listing, the system is vulnerable. [2]