An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/01/12/3 | Mailing List Patch Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1179999 | Issue Tracking Third Party Advisory |
https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a31c9f9094fcda/crmsh/history.py#L476 | Patch Third Party Advisory |
https://github.com/ClusterLabs/crmsh/releases | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/01/msg00021.html | Mailing List Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/01/12/3 | Exploit Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-12 15:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-35459
Mitre link : CVE-2020-35459
CVE.ORG link : CVE-2020-35459
JSON object : View
Products Affected
debian
- debian_linux
clusterlabs
- crmsh
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')