Learn about CVE-2020-35458, a Ruby shell code injection issue in ClusterLabs Hawk 2.x through 2.3.0-x, allowing remote attackers to execute code as hauser. Find mitigation steps and prevention measures.
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. A Ruby shell code injection vulnerability exists via the hawk_remember_me_id parameter in the login_from_cookie cookie, allowing unauthenticated remote attackers to execute code as hauser.
Understanding CVE-2020-35458
This CVE involves a security vulnerability in ClusterLabs Hawk 2.x through 2.3.0-x that enables remote code execution.
What is CVE-2020-35458?
CVE-2020-35458 is a Ruby shell code injection issue in ClusterLabs Hawk 2.x through 2.3.0-x. Attackers can exploit the hawk_remember_me_id parameter in the login_from_cookie cookie to execute code as hauser.
The Impact of CVE-2020-35458
The vulnerability allows unauthenticated remote attackers to execute arbitrary code as hauser, potentially leading to unauthorized access and control of the affected system.
Technical Details of CVE-2020-35458
This section provides more in-depth technical insights into the CVE.
Vulnerability Description
The issue arises from a Ruby shell code injection vulnerability via the hawk_remember_me_id parameter in the login_from_cookie cookie within ClusterLabs Hawk 2.x through 2.3.0-x.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit the vulnerability by manipulating the hawk_remember_me_id parameter in the login_from_cookie cookie, enabling the execution of arbitrary code as hauser.
Mitigation and Prevention
Protecting systems from CVE-2020-35458 requires immediate actions and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates