CVE-2021-3020

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3020
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3020.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-3020
Related
Published
2022-08-26T00:15:08Z
Modified
2024-05-15T01:14:28.229741Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawkinvoke (built from tools/hawkinvoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.

References

Affected packages

Git / github.com/clusterlabs/crmsh

Affected ranges

Type
GIT
Repo
https://github.com/clusterlabs/crmsh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/clusterlabs/hawk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0-alpha1
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6-rc1
1.2.6-rc2

2.*

2.0.0
2.1.0
2.2.0
2.2.0-15
2.2.0-rc1
2.2.0-rc2
2.2.0-rc3
2.3.0
2.3.0-15
2.3.1

3.*

3.0.0

4.*

4.0.0
4.1.0
4.2.0
4.2.1

hawk-0.*

hawk-0.1.1
hawk-0.1.2
hawk-0.1.3
hawk-0.2.0
hawk-0.2.1
hawk-0.3.0
hawk-0.3.1
hawk-0.3.2
hawk-0.3.3
hawk-0.3.4
hawk-0.3.5
hawk-0.3.6
hawk-0.4.0
hawk-0.4.1
hawk-0.5.0
hawk-0.5.1
hawk-0.5.2
hawk-0.6.0
hawk-0.6.1
hawk-0.6.2

hawk-2.*

hawk-2.0.0