CVE-2020-35458

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-35458
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35458.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-35458
Related
Published
2021-01-12T15:15:13Z
Modified
2024-05-14T08:08:39.948853Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawkremembermeid parameter in the loginfrom_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.

References

Affected packages

Git / github.com/clusterlabs/hawk

Affected ranges

Type
GIT
Repo
https://github.com/clusterlabs/hawk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

1.*

1.0.0-alpha1

2.*

2.2.0-12
2.3.0-12

hawk-0.*

hawk-0.1.1
hawk-0.1.2
hawk-0.1.3
hawk-0.2.0
hawk-0.2.1
hawk-0.3.0
hawk-0.3.1
hawk-0.3.2
hawk-0.3.3
hawk-0.3.4
hawk-0.3.5
hawk-0.3.6
hawk-0.4.0
hawk-0.4.1
hawk-0.5.0
hawk-0.5.1
hawk-0.5.2
hawk-0.6.0
hawk-0.6.1
hawk-0.6.2

hawk-2.*

hawk-2.0.0