First published: Tue Nov 23 2021(Updated: )
There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei FusionCompute | =6.0.0 | |
Huawei FusionCompute | =6.3.0 | |
Huawei FusionCompute | =6.3.1 | |
Huawei FusionCompute | =6.5.0 | |
Huawei FusionCompute | =6.5.1 | |
Huawei FusionCompute | =8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37102 is a command injection vulnerability in the CMA service module of the FusionCompute product.
CVE-2021-37102 affects Huawei FusionCompute versions 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, and 8.0.0.
CVE-2021-37102 has a severity score of 8.8 (critical).
CVE-2021-37102 can be exploited by an attacker providing specially crafted input to the default certificate file, leading to command injection.
Yes, Huawei has released a security advisory with instructions for fixing CVE-2021-37102. Please refer to the official Huawei website for the advisory.