A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||8.8||Base Metrics:||AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H|
|Access Vector:||Network||Attack Complexity:||Low|
|Privileges Required:||None||User Interaction:||Required|
|Integrity Impact:||High||Availability Impact:||High|
|Oracle Linux version 7 (sssd)||ELSA-2021-3336||2021-09-01|
|Oracle Linux version 8 (sssd)||ELSA-2021-3151||2021-08-17|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team