Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mbadanoiu/cve-2021-42561
CVE-2021-42561: Command Injection via the Human Plugin in MITRE Caldera
https://github.com/mbadanoiu/cve-2021-42561
0-day authenticated cve cve-2021-42561 cves remote-code-execution
Last synced: 2 days ago
JSON representation
CVE-2021-42561: Command Injection via the Human Plugin in MITRE Caldera
- Host: GitHub
- URL: https://github.com/mbadanoiu/cve-2021-42561
- Owner: mbadanoiu
- Created: 2024-06-09T22:39:46.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2024-06-09T22:42:48.000Z (5 months ago)
- Last Synced: 2024-06-10T00:44:04.384Z (5 months ago)
- Topics: 0-day, authenticated, cve, cve-2021-42561, cves, remote-code-execution
- Homepage:
- Size: 2.17 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2021-42561: Command Injection via the Human Plugin in MITRE Caldera
In Caldera (versions <=2.8.1) the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allow attackers to use shell metacharacters (e.g. backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
### Vendor Disclosure:
The vendor's disclosure for this vulnerability can be found [here](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42561).
### Requirements:
This vulnerability requires:
- Valid user credentials### Proof Of Concept:
More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2021-42561/blob/main/Caldera%20-%20CVE-2021-42561.pdf).