Vulnerability Details : CVE-2021-40348
Potential exploit
Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.
Products affected by CVE-2021-40348
- cpe:2.3:a:spacewalk_project:spacewalk:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:uyuni-project:uyuni:2021.08:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-40348
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-40348
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-40348
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-40348
-
https://github.com/uyuni-project/uyuni/commit/790c7388efac6923c5475e01c1ff718dffa9f052
Merge pull request #4414 from uyuni-project/Uyuni-2021.09 · uyuni-project/uyuni@790c738 · GitHubPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/10/28/4
oss-security - spacewalk-admin: CVE-2021-40348: arbitrary local code execution by 'tomcat' user via rhn-config-satellite.plExploit;Mailing List;Patch;Third Party Advisory
Jump to