Description
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Published: 2022-02-06
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-29432 A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
History

No history.

Subscriptions

Starwindsoftware Nas San
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T04:13:56.675Z

Reserved: 2022-02-06T00:00:00.000Z

Link: CVE-2022-24552

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-06T21:15:08.073

Modified: 2024-11-21T06:50:39.317

Link: CVE-2022-24552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses