An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
References
Link Resource
http://www.openwall.com/lists/oss-security/2021/01/12/3 Mailing List Patch Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1179998 Issue Tracking Patch Third Party Advisory
https://github.com/ClusterLabs/hawk/releases Release Notes Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/01/12/3 Mailing List Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-01-12T14:21:23

Updated: 2021-01-12T15:06:08

Reserved: 2020-12-14T00:00:00


Link: CVE-2020-35458

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-01-12T15:15:13.890

Modified: 2021-07-21T11:39:23.747


Link: CVE-2020-35458

JSON object: View

cve-icon Redhat Information

No data.

CWE