Описание
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.2 (исключая)Версия до 0.2 (исключая)
Одно из
cpe:2.3:a:starwindsoftware:nas:*:*:*:*:*:*:*:*
cpe:2.3:a:starwindsoftware:san:*:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.0109
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 9.8
github
почти 4 года назад
StarWind SAN and NAS before 0.2 build 1685 allows remote code execution via a virtual disk management command.
EPSS
Процентиль: 78%
0.0109
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78