CVE-2021-22557

SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:slo_generator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:50

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 7.8
v2 : 6.8
v3 : 5.3
References () http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/google/slo-generator/pull/173 - Exploit, Patch, Third Party Advisory () https://github.com/google/slo-generator/pull/173 - Exploit, Patch, Third Party Advisory

Information

Published : 2021-10-04 10:15

Updated : 2024-11-21 05:50


NVD link : CVE-2021-22557

Mitre link : CVE-2021-22557

CVE.ORG link : CVE-2021-22557


JSON object : View

Products Affected

google

  • slo_generator
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')