First published: Wed Feb 22 2023(Updated: )
A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.
Credit: zowe-security@lists.openmainframeproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zowe | >=1.16.0<1.28.2 | |
Zowe | >=2.0.0<2.5.0 |
This issue is fixed in Zowe 1.28.2 or later, and Zowe 2.5.0 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4326 is rated as a medium severity vulnerability.
To fix CVE-2021-4326, it is recommended to upgrade to Zowe version 1.28.3 or later for versions 1.16.0 to 1.28.2 and to version 2.5.1 or later for versions 2.0.0 to 2.5.0.
CVE-2021-4326 affects certain versions of the Zowe CLI framework from Linux Foundation.
Exploitation of CVE-2021-4326 allows already-privileged local actors to execute arbitrary shell commands.
Yes, maliciously formed environment variables can be used to exploit CVE-2021-4326.