CVE-2014-8126
condor: mailx invocation enables code execution as condor user
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code.
El planificador en HTCondor versiones anteriores a 8.2.6, permite a usuarios autenticados remotos ejecutar código arbitrario.
The HTCondor scheduler can optionally notify a user of completed jobs by sending an email. Due to the way the daemon sent the email message, authenticated users able to submit jobs could execute arbitrary code with the privileges of the condor user.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-10-10 CVE Reserved
- 2015-01-12 CVE Published
- 2023-06-20 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-0035.html | Third Party Advisory | |
http://rhn.redhat.com/errata/RHSA-2015-0036.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1169800 | 2015-01-12 |
URL | Date | SRC |
---|---|---|
https://www-auth.cs.wisc.edu/lists/htcondor-users/2015-January/msg00034.shtml | 2020-02-05 | |
https://access.redhat.com/security/cve/CVE-2014-8126 | 2015-01-12 |