mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
20 lines
995 B
Markdown
20 lines
995 B
Markdown
### [CVE-2021-42561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42561)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42561-Command%20Injection%20Via%20the%20Human%20Plugin-MITRE%20Caldera
|
|
- https://github.com/mitre/caldera/releases
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/mbadanoiu/CVE-2021-42561
|
|
|