A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-29432 A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T04:13:56.675Z

Reserved: 2022-02-06T00:00:00

Link: CVE-2022-24552

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-06T21:15:08.073

Modified: 2024-11-21T06:50:39.317

Link: CVE-2022-24552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.