cve/2021/CVE-2021-28246.md

18 lines
942 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-28246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28246)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
### POC
#### Reference
- https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
#### Github
No PoCs found on GitHub currently.