CVE-2020-35458
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
12/01/2021
Last modified:
21/07/2021
Description
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:clusterlabs:hawk:2.2.0-12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clusterlabs:hawk:2.3.0-12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



