Описание
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.16.1-1ubuntu1.8 |
devel | released | 2.4.1-2ubuntu4 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 1.16.1-1ubuntu1.8 |
esm-infra/focal | not-affected | 2.2.3-3ubuntu0.7 |
esm-infra/xenial | not-affected | code not present |
focal | released | 2.2.3-3ubuntu0.7 |
hirsute | released | 2.4.0-1ubuntu6.1 |
impish | released | 2.4.1-2ubuntu4 |
jammy | released | 2.4.1-2ubuntu4 |
Показывать по
EPSS
9.3 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in SSSD, where the sssctl command was vulnerable to s ...
EPSS
9.3 Critical
CVSS2
8.8 High
CVSS3