A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "34"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.1"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:fedoraproject:sssd:2.6.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.6.0"
}
],
"source": "CPE_FIELD"
}