In WhiteBeam 0.2.0 through 0.2.1 before 0.2.2, a user with local access to a server can bypass the allow-list functionality because a file can be truncated in the OpenFileDescriptor action before the VerifyCanWrite action is performed.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-34681 In WhiteBeam 0.2.0 through 0.2.1 before 0.2.2, a user with local access to a server can bypass the allow-list functionality because a file can be truncated in the OpenFileDescriptor action before the VerifyCanWrite action is performed.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Jun 2025 20:00:00 +0000

Type Values Removed Values Added
Description In WhiteBeam 0.2.0 through 0.2.1 before 0.2.2, a user with local access to a server can bypass the allow-list functionality because a file can be truncated in the OpenFileDescriptor action before the VerifyCanWrite action is performed.
Weaknesses CWE-696
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-24T18:07:21.177Z

Reserved: 2025-06-23T00:00:00.000Z

Link: CVE-2021-47688

cve-icon Vulnrichment

Updated: 2025-06-24T13:46:51.026Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-23T20:15:26.957

Modified: 2025-06-23T20:16:21.633

Link: CVE-2021-47688

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.