Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-40055 | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion. |
Fixes
Solution
Upgrade to OpenNebula 6.4.2 EE LTS and configure the CONTEXT_RESTRICTED_DIRS and CONTEXT_SAFE_DIRS properties in oned.conf
Workaround
Do not allow regular users to use the FILES directive inside their VM templates, instead set up a context files datastore, and allow users to upload and reference their files from that datastore, using the FILES_DS directive.
References
History
No history.

Status: PUBLISHED
Assigner: blackberry
Published:
Updated: 2024-08-03T10:29:21.021Z
Reserved: 2022-08-05T00:00:00
Link: CVE-2022-37425

No data.

Status : Modified
Published: 2022-10-28T16:15:16.080
Modified: 2024-11-21T07:14:58.160
Link: CVE-2022-37425

No data.

No data.