An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
References
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/01/12/3 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1179999 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a31c9f9094fcda/crmsh/history.py#L476 - Patch, Third Party Advisory | |
References | () https://github.com/ClusterLabs/crmsh/releases - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/01/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2021/01/12/3 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2021-01-12 15:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35459
Mitre link : CVE-2020-35459
CVE.ORG link : CVE-2020-35459
JSON object : View
Products Affected
debian
- debian_linux
clusterlabs
- crmsh
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')