CVE-2020-35459: ClusterLabs crmsh vulnerable to shell code injection
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1388%
CWE
Published
5/24/2022
Updated
8/23/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| crmsh | pip | <= 4.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the session creation functionality where user-controlled input (session name) is passed to a shell command without proper sanitization. The code at line 476 of history.py uses utils.pipe_cmd_nosudo() with a formatted string containing session_dir, which could contain malicious shell characters. The provided patch from SUSE Bugzilla shows this was fixed by replacing the system mkdir call with Python's Path.mkdir(), confirming the insecure usage of shell commands with user input.