Описание
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
Ссылки
- Mailing ListPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Release NotesThird Party Advisory
- Mailing ListPatchThird Party Advisory
- Mailing ListPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Release NotesThird Party Advisory
- Mailing ListPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:clusterlabs:hawk:2.2.0-12:*:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:hawk:2.3.0-12:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.12988
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78
EPSS
Процентиль: 94%
0.12988
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78