Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02ZzU2LXY5cWctanA5Ms4AA7S7
Heketi Arbitrary Code Execution
A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
Permalink: https://github.com/advisories/GHSA-6g56-v9qg-jp92JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02ZzU2LXY5cWctanA5Ms4AA7S7
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 7 months ago
Updated: 7 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-6g56-v9qg-jp92, CVE-2017-15103
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-15103
- https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00
- https://access.redhat.com/errata/RHSA-2017:3481
- https://access.redhat.com/security/cve/CVE-2017-15103
- https://bugzilla.redhat.com/show_bug.cgi?id=1510147
- https://github.com/heketi/heketi/releases/tag/v5.0.1
- https://github.com/advisories/GHSA-6g56-v9qg-jp92
Blast Radius: 30.8
Affected Packages
go:github.com/heketi/heketi
Dependent packages: 252Dependent repositories: 3,197
Downloads:
Affected Version Ranges: < 5.0.1
Fixed in: 5.0.1
All affected versions: 2.0.6, 3.0.0, 3.1.0, 4.0.0, 5.0.0
All unaffected versions: 5.0.1, 6.0.0, 7.0.0, 8.0.0, 9.0.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0