A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link | Resource |
---|---|
https://sssd.io/release-notes/sssd-2.6.0.html | Release Notes Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1975142 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-12-23 13:15
Updated : 2022-10-24 09:38
NVD link : CVE-2021-3621
Mitre link : CVE-2021-3621
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
sssd
- sssd
redhat
- enterprise_linux
- enterprise_linux_server_aus
- virtualization
- enterprise_linux_server_tus
- virtualization_host
- enterprise_linux_eus
fedoraproject
- fedora