10
CVSSv2

CVE-2020-35458

Published: 12/01/2021 Updated: 21/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in ClusterLabs Hawk 2.x up to and including 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote malicious users to execute code as hauser.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

clusterlabs hawk 2.3.0-12

clusterlabs hawk 2.2.0-12

Mailing Lists

Hi folks, We have received reports of 2 security issues for hawk and crmsh These hawk and crmsh projects refer to distros@ for their disclosure work These issues were reported to SUSE by Vincent Berg of Anvil Ventures 1 Remote unauthenticated shell injection into the Hawk webserver Hawk is a High Availability specific webconsole with its ...