CVE-2021-44079

In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
References
Link Resource
https://github.com/wazuh/wazuh/issues/10858 Exploit Issue Tracking Mitigation Third Party Advisory
https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254 Issue Tracking Patch Third Party Advisory
https://github.com/wazuh/wazuh/pull/10809 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-11-22 07:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-44079

Mitre link : CVE-2021-44079

CVE.ORG link : CVE-2021-44079


JSON object : View

Products Affected

wazuh

  • wazuh
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')