### [CVE-2021-27101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27101) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ChalkingCode/ExploitedDucks - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/accellion/CVEs - https://github.com/dudacgf/ovr_convert - https://github.com/eeenvik1/scripts_for_YouTrack - https://github.com/takumakume/dependency-track-policy-applier