First published: Wed Jan 12 2022(Updated: )
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MITRE CALDERA | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42561 is critical with a CVSS score of 8.8.
The vulnerability in CALDERA 2.8.1 is a command injection vulnerability in the Human plugin.
The vulnerability allows attackers to use shell metacharacters to escape the current command and execute arbitrary commands.
The affected software is CALDERA version 2.8.1.
To fix the vulnerability, update CALDERA to a version that includes the fix, such as version X.X.X.