First published: Mon Nov 22 2021(Updated: )
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wazuh | >=4.2.0<4.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44079 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2021-44079, upgrade Wazuh to version 4.2.5 or later.
CVE-2021-44079 can allow untrusted user agents to execute arbitrary code on the vulnerable system.
CVE-2021-44079 affects Wazuh versions from 4.2.0 to 4.2.4.
There is no official workaround for CVE-2021-44079, so it is recommended to apply the upgrade as soon as possible.