A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
References
Link | Resource |
---|---|
https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p | Exploit Third Party Advisory |
https://lpar2rrd.com/note730.php | Release Notes Vendor Advisory |
https://stor2rrd.com/note730.php | Release Notes Vendor Advisory |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p | Exploit Third Party Advisory |
https://lpar2rrd.com/note730.php | Release Notes Vendor Advisory |
https://stor2rrd.com/note730.php | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p - Exploit, Third Party Advisory | |
References | () https://lpar2rrd.com/note730.php - Release Notes, Vendor Advisory | |
References | () https://stor2rrd.com/note730.php - Release Notes, Vendor Advisory |
Information
Published : 2021-11-08 05:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42372
Mitre link : CVE-2021-42372
CVE.ORG link : CVE-2021-42372
JSON object : View
Products Affected
xorux
- lpar2rrd
- stor2rrd
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')