An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2021/01/12/3 | Exploit Mailing List Third Party Advisory |
https://github.com/ClusterLabs/crmsh/releases | Release Notes Third Party Advisory |
https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a31c9f9094fcda/crmsh/history.py#L476 | Patch Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1179999 | Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/01/12/3 | Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/01/msg00021.html | Mailing List Third Party Advisory |
Information
Published : 2021-01-12 07:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-35459
Mitre link : CVE-2020-35459
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
debian
- debian_linux
clusterlabs
- crmsh