An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1179998 | patch third party advisory issue tracking |
https://github.com/ClusterLabs/hawk/releases | third party advisory release notes |
https://www.openwall.com/lists/oss-security/2021/01/12/3 | patch mailing list third party advisory |
http://www.openwall.com/lists/oss-security/2021/01/12/3 | patch mailing list third party advisory |