A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
The product receives data from an upstream component, but does not filter or incorrectly filters special elements before sending it to a downstream component.
Link | Tags |
---|---|
https://github.com/facebook/tac_plus/pull/41 | patch exploit |
https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ | third party advisory mailing list |