First published: Fri Jun 03 2022(Updated: )
StarWind SAN and NAS v0.2 build 1914 allow remote code execution. A flaw was found in REST API in StarWind Stack. REST command, which allows changing the hostname, doesn’t check a new hostname parameter. It goes directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Starwindsoftware Starwind San \& Nas | =0.2-build_1914 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32268 is a vulnerability found in StarWind SAN and NAS v0.2 build 1914 that allows remote code execution.
CVE-2022-32268 allows an attacker with non-root user access to inject arbitrary code through the REST API in StarWind Stack, potentially leading to remote code execution.
CVE-2022-32268 has a severity rating of critical with a CVSS score of 8.8.
To fix CVE-2022-32268, users should update to a patched version of StarWind SAN and NAS that addresses the REST API vulnerability.
More information about CVE-2022-32268 can be found at the following reference: [https://www.starwindsoftware.com/security/sw-20220531-0001/](https://www.starwindsoftware.com/security/sw-20220531-0001/)