CVE Vulnerabilities

CVE-2021-42561

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Jan 12, 2022 | Modified: Jul 12, 2022
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
9 HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python os.system function. This allows attackers to use shell metacharacters (e.g., backticks `` or dollar parenthesis $() ) in order to escape the current command and execute arbitrary shell commands.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Caldera Mitre * 2.8.1 (including)

Potential Mitigations

References