A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
2021-12-23T21:15:08.920
2025-11-03T21:15:42.140
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | fedoraproject | sssd | 2.6.0 | Yes |
| Application | redhat | virtualization | 4.0 | Yes |
| Application | redhat | virtualization_host | 4.0 | Yes |
| Operating System | redhat | enterprise_linux | 6.0 | Yes |
| Operating System | redhat | enterprise_linux | 7.0 | Yes |
| Operating System | redhat | enterprise_linux | 8.0 | Yes |
| Operating System | redhat | enterprise_linux_eus | 8.1 | Yes |
| Operating System | redhat | enterprise_linux_eus | 8.2 | Yes |
| Operating System | redhat | enterprise_linux_server_aus | 8.2 | Yes |
| Operating System | redhat | enterprise_linux_server_aus | 8.4 | Yes |
| Operating System | redhat | enterprise_linux_server_tus | 8.2 | Yes |
| Operating System | redhat | enterprise_linux_server_tus | 8.4 | Yes |
| Operating System | fedoraproject | fedora | 34 | Yes |