A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SUSE Rancher allows code execution for user with the ability to add an untrusted Helm catalog or modifying the URL configuration used to download KDM (only admin users by default) This issue affects: SUSE Rancher Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1205294 | Issue Tracking |
https://bugzilla.suse.com/show_bug.cgi?id=1205294 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.suse.com/show_bug.cgi?id=1205294 - Issue Tracking | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
Information
Published : 2023-02-07 13:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43758
Mitre link : CVE-2022-43758
CVE.ORG link : CVE-2022-43758
JSON object : View
Products Affected
suse
- rancher
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')