TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2022-2068

HIGH
7.3

Beschreibung

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVE Details

CVSS v3.1 Bewertung7.3
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionREQUIRED
Veroffentlicht6/21/2022
Zuletzt geandert11/3/2025
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

broadcom:sannavdebian:debian_linuxfedoraproject:fedoranetapp:aff_8300netapp:aff_8300_firmwarenetapp:aff_8700netapp:aff_8700_firmwarenetapp:aff_a400netapp:aff_a400_firmwarenetapp:bootstrap_osnetapp:element_softwarenetapp:fas_8300netapp:fas_8300_firmwarenetapp:fas_8700netapp:fas_8700_firmwarenetapp:fas_a400netapp:fas_a400_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610cnetapp:h610c_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h615cnetapp:h615c_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_compute_nodenetapp:hci_management_nodenetapp:ontap_antivirus_connectornetapp:ontap_select_deploy_administration_utilitynetapp:santricity_smi-s_providernetapp:smi-s_providernetapp:snapmanagernetapp:solidfireopenssl:opensslsiemens:sinec_ins

Schwachen (CWE)

CWE-78CWE-78

Referenzen

https://www.debian.org/security/2022/dsa-5169(openssl-security@openssl.org)
http://seclists.org/fulldisclosure/2024/Nov/0(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.com/fraf0/cve-2022-1292-re_score-analysis(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220707-0008/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5169(af854a3a-2127-422b-91ae-364da2661108)
https://www.openssl.org/news/secadv/20220621.txt(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.