129 lines
4.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-37102",
"sourceIdentifier": "psirt@huawei.com",
"published": "2021-11-23T16:15:09.980",
"lastModified": "2021-11-26T15:56:35.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo de servicio CMA del producto FusionCompute cuando es procesado el archivo de certificado predeterminado. El software construye parte de un comando usando una entrada especial externa de usuarios, pero el software no comprueba suficientemente la entrada del usuario. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante inyectar determinados comandos en el sistema. Las versiones del producto afectadas son: FusionCompute versiones 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A044DA05-E139-4572-8562-09A4A54E8D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "319C5290-36D1-4A96-80D3-18978161557D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9EFA1D96-F198-4424-8F5A-1C7DFF3F42AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB149F98-77DF-40C3-A307-21D7B9BCB6DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "916284A3-6895-4F2C-9426-240F4EB7336F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:fusioncompute:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D251AD0-6227-4190-815F-B526F40D8A43"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-cmd-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}