First published: Sun Feb 06 2022(Updated: )
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Starwindsoftware Nas | <0.2 | |
Starwindsoftware San | <0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-24552.
The severity level of CVE-2022-24552 is critical.
The affected software is StarWind Stack version up to and excluding 0.2, including Starwindsoftware Nas and Starwindsoftware San.
The CWE ID for this vulnerability is CWE-78.
An attacker with non-root user access can inject arbitrary data into a REST command that manipulates a virtual disk, which will be executed with root privileges.