First published: Mon Nov 06 2017(Updated: )
A flaw was found in heketi API that permits issuing of OS commands through especially crafted requests, possibly leading to escalation of privileges. <a href="https://github.com/heketi/heketi/releases/tag/v5.0.1">https://github.com/heketi/heketi/releases/tag/v5.0.1</a> <a href="https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00">https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00</a> <a href="https://access.redhat.com/security/vulnerabilities/3246991">https://access.redhat.com/security/vulnerabilities/3246991</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Heketi Project Heketi | =5.0 | |
Redhat Enterprise Linux | =7.0 | |
go/github.com/heketi/heketi | <5.0.1 | 5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15103 is a security-check flaw in the Heketi 5 server API that allows for remote command execution and possible privilege escalation.
CVE-2017-15103 affects Heketi version 5.0, allowing an authenticated user to send specially crafted requests to the server.
CVE-2017-15103 has a severity rating of 8.8 (Critical).
The CWEs associated with CVE-2017-15103 are CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-20 (Improper Input Validation).
To fix CVE-2017-15103, you should apply the patches and updates provided by the Heketi Project or Redhat Enterprise Linux, depending on your software version.