CVE-2017-15103
heketi: OS command injection in heketi API
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
Se ha detectado una vulnerabilidad de chequeo de seguridad en la manera en la que la API del servidor de Heketi 5 gestionaba las peticiones de los usuarios. Un usuario de Heketi autenticado podría enviar peticiones especialmente manipuladas al servidor Heketi, resultando en la ejecución remota de comandos como usuario que ejecuta el servidor de Heketi y, posiblemente, un escalado de privilegios.
A security-check flaw was found in the way the Heketi server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-08 CVE Reserved
- 2017-12-18 CVE Published
- 2024-03-23 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1510147 | 2017-12-18 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:3481 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2017-15103 | 2017-12-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Heketi Project Search vendor "Heketi Project" | Heketi Search vendor "Heketi Project" for product "Heketi" | 5.0 Search vendor "Heketi Project" for product "Heketi" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
|