CVE-2021-47827

7.5 HIGH

📋 TL;DR

CVE-2021-47827 is a denial of service vulnerability in WebSSH for iOS that allows attackers to crash the application by pasting malformed input into the mashREPL tool. This affects iOS users running WebSSH version 14.16.10 who use the mashREPL functionality. The vulnerability can be triggered remotely if the application is exposed to untrusted input sources.

💻 Affected Systems

Products:
  • WebSSH for iOS
Versions: 14.16.10
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the mashREPL tool within WebSSH application. Standard SSH connections are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash requiring restart, potentially disrupting SSH sessions and causing data loss in active connections.

🟠

Likely Case

Temporary application crash requiring user to restart WebSSH, interrupting any active SSH sessions.

🟢

If Mitigated

Minimal impact if application is not exposed to untrusted input or if input validation is implemented.

🌐 Internet-Facing: MEDIUM - Requires user interaction to paste malicious content, but could be triggered via social engineering or malicious websites.
🏢 Internal Only: LOW - Requires deliberate action by users with application access, unlikely to be exploited accidentally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user to copy and paste malicious content into the application. Proof of concept available in exploit databases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check App Store for updated version

Vendor Advisory: https://apps.apple.com/mx/app/webssh-ssh-client/id497714887

Restart Required: Yes

Instructions:

1. Open App Store on iOS device
2. Navigate to Updates tab
3. Check for WebSSH update
4. Install available update
5. Restart WebSSH application

🔧 Temporary Workarounds

Disable mashREPL Tool

ios

Prevent use of the vulnerable mashREPL component

Input Validation

all

Implement client-side input validation for mashREPL field

🧯 If You Can't Patch

  • Avoid using mashREPL tool functionality
  • Educate users not to paste untrusted content into WebSSH

🔍 How to Verify

Check if Vulnerable:

Check WebSSH version in iOS Settings > General > iPhone Storage > WebSSH

Check Version:

Not applicable for iOS apps - check via App Store or device settings

Verify Fix Applied:

Verify updated version is installed from App Store and test mashREPL with malformed input

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs showing WebSSH termination
  • Unexpected application restarts

Network Indicators:

  • Sudden termination of SSH sessions from WebSSH

SIEM Query:

Not typically applicable for mobile application DoS

🔗 References

📤 Share & Export