Lucene search

K
cveOpensslCVE-2022-2068
HistoryJun 21, 2022 - 3:15 p.m.

CVE-2022-2068

2022-06-2115:15:09
CWE-78
openssl
web.nvd.nist.gov
879
12
20
cve-2022-2068
shell command injection
c_rehash
openssl
security vulnerability
code review
command injection
3.0.4
1.1.1p
1.0.2zf

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.123

Percentile

95.6%

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

Affected configurations

Nvd
Node
opensslopensslRange1.0.21.0.2zf
OR
opensslopensslRange1.1.11.1.1p
OR
opensslopensslRange3.0.03.0.4
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
siemenssinec_insRange<1.0
OR
siemenssinec_insMatch1.0-
OR
siemenssinec_insMatch1.0sp1
OR
siemenssinec_insMatch1.0sp2
Node
netappelement_softwareMatch-
OR
netapphci_management_nodeMatch-
OR
netappontap_antivirus_connectorMatch-
OR
netappontap_select_deploy_administration_utilityMatch-
OR
netappsantricity_smi-s_providerMatch-
OR
netappsmi-s_providerMatch-
OR
netappsnapmanagerMatch-hyper-v
OR
netappsolidfireMatch-
Node
netappbootstrap_osMatch-
AND
netapphci_compute_nodeMatch-
Node
netapph615c_firmwareMatch-
AND
netapph615cMatch-
Node
netapph610s_firmwareMatch-
AND
netapph610sMatch-
Node
netapph610c_firmwareMatch-
AND
netapph610cMatch-
Node
netapph410c_firmwareMatch-
AND
netapph410cMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
netappfas_8300_firmwareMatch-
AND
netappfas_8300Match-
Node
netappfas_8700_firmwareMatch-
AND
netappfas_8700Match-
Node
netappfas_a400_firmwareMatch-
AND
netappfas_a400Match-
Node
netappaff_8300_firmwareMatch-
AND
netappaff_8300Match-
Node
netappaff_8700_firmwareMatch-
AND
netappaff_8700Match-
Node
netappaff_a400_firmwareMatch-
AND
netappaff_a400Match-
Node
broadcomsannavMatch-
VendorProductVersionCPE
opensslopenssl*cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debiandebian_linux11.0cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
fedoraprojectfedora35cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
fedoraprojectfedora36cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
siemenssinec_ins*cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
siemenssinec_ins1.0cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
siemenssinec_ins1.0cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
siemenssinec_ins1.0cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
netappelement_software-cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 481

CNA Affected

[
  {
    "vendor": "OpenSSL",
    "product": "OpenSSL",
    "versions": [
      {
        "version": "Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3)",
        "status": "affected"
      },
      {
        "version": "Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o)",
        "status": "affected"
      },
      {
        "version": "Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze)",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.123

Percentile

95.6%