Описание
ClusterLabs crmsh vulnerable to shell code injection
An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call crm history (when crm is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-35459
- https://bugzilla.suse.com/show_bug.cgi?id=1179999
- https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a31c9f9094fcda/crmsh/history.py#L476
- https://github.com/ClusterLabs/crmsh/releases
- https://lists.debian.org/debian-lts-announce/2021/01/msg00021.html
- https://www.openwall.com/lists/oss-security/2021/01/12/3
- http://www.openwall.com/lists/oss-security/2021/01/12/3
Пакеты
crmsh
<= 4.2.1
Отсутствует
Связанные уязвимости
An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
An issue was discovered in ClusterLabs crmsh through 4.2.1. Local atta ...