First published: Wed Jun 23 2021(Updated: )
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <0:1.16.5-10.el7_9.10 | 0:1.16.5-10.el7_9.10 |
redhat/sssd | <0:2.4.0-9.el8_4.2 | 0:2.4.0-9.el8_4.2 |
redhat/sssd | <0:2.2.0-19.el8_1.2 | 0:2.2.0-19.el8_1.2 |
redhat/sssd | <0:2.2.3-20.el8_2.1 | 0:2.2.3-20.el8_2.1 |
redhat/redhat-virtualization-host | <0:4.3.18-20210903.0.el7_9 | 0:4.3.18-20210903.0.el7_9 |
redhat/redhat-virtualization-host | <0:4.4.7-20210804.0.el8_4 | 0:4.4.7-20210804.0.el8_4 |
Sssd Sssd | =2.6.0 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Fedoraproject Fedora | =34 | |
redhat/sssd | <2.6.0 | 2.6.0 |
Fedoraproject Sssd | =2.6.0 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3621 is a vulnerability in SSSD where the sssctl command is vulnerable to shell command injection.
CVE-2021-3621 allows an attacker to trick the root user into running a specially crafted sssctl command to gain root access.
CVE-2021-3621 has a severity rating of critical with a score of 8.8.
To fix CVE-2021-3621, update SSSD to version 2.6.0 or apply the recommended patch from Red Hat.
You can find more information about CVE-2021-3621 in the release notes, Red Hat advisory, and Bugzilla report.