// For flags

CVE-2021-31580

Akkadian Provisioning Manager Engine (PME) Shell Escape via 'exec' command

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be bypassed by switching the OpenSSH channel from `shell` to `exec` and providing the ssh client a single execution parameter. This issue was resolved in Akkadian OVA appliance version 3.0 (and later), Akkadian Provisioning Manager 5.0.2 (and later), and Akkadian Appliance Manager 3.3.0.314-4a349e0 (and later).

El shell restringido proporcionado por Akkadian Provisioning Manager Engine (PME) puede ser omitido cambiando el canal OpenSSH de "shell" a "exec" y proporcionando al cliente ssh un único parámetro de ejecución. Este problema fue resuelto en Akkadian OVA appliance versiones 3.0 (y posteriores), Akkadian Provisioning Manager versiones 5.0.2 (y posteriores), and Akkadian Appliance Manager versiones 3.3.0.314-4a349e0 (y posteriores)

*Credits: Cale Black, Ryan Villarreal, and Jonathan Peterson of Rapid7
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-04-22 CVE Reserved
  • 2021-07-22 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Akkadianlabs
Search vendor "Akkadianlabs"
Ova Appliance
Search vendor "Akkadianlabs" for product "Ova Appliance"
< 3.0
Search vendor "Akkadianlabs" for product "Ova Appliance" and version " < 3.0"
-
Affected
Akkadianlabs
Search vendor "Akkadianlabs"
Provisioning Manager
Search vendor "Akkadianlabs" for product "Provisioning Manager"
>= 3.0.0 < 3.3.0.314-4a349e0
Search vendor "Akkadianlabs" for product "Provisioning Manager" and version " >= 3.0.0 < 3.3.0.314-4a349e0"
-
Affected
Akkadianlabs
Search vendor "Akkadianlabs"
Provisioning Manager
Search vendor "Akkadianlabs" for product "Provisioning Manager"
>= 4.0.0 < 5.0.2
Search vendor "Akkadianlabs" for product "Provisioning Manager" and version " >= 4.0.0 < 5.0.2"
-
Affected