A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
2021-12-23T21:15:08.920
2024-11-21T06:22:00.150
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fedoraproject | sssd | 2.6.0 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Application | redhat | virtualization_host | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.1 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.4 | Yes |
Operating System | fedoraproject | fedora | 34 | Yes |