Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-2068 | First vendor Publication | 2022-06-21 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-03-29 02:59:32 |
|
2025-03-28 13:29:21 |
|
2024-11-28 14:05:19 |
|
2024-08-02 13:32:08 |
|
2024-08-02 01:28:06 |
|
2024-03-01 13:19:45 |
|
2024-02-02 02:31:18 |
|
2024-02-01 12:25:52 |
|
2023-11-07 21:32:07 |
|
2023-09-05 13:25:44 |
|
2023-09-05 01:25:19 |
|
2023-09-02 13:24:05 |
|
2023-09-02 01:25:43 |
|
2023-08-12 13:30:16 |
|
2023-08-12 01:24:58 |
|
2023-08-11 13:22:22 |
|
2023-08-11 01:25:47 |
|
2023-08-09 02:11:03 |
|
2023-08-06 13:20:07 |
|
2023-08-06 01:24:40 |
|
2023-08-04 13:20:32 |
|
2023-08-04 01:25:02 |
|
2023-07-14 13:20:34 |
|
2023-07-14 01:24:48 |
|
2023-03-29 02:22:30 |
|
2023-03-28 12:24:59 |
|
2023-03-01 21:27:37 |
|
2023-01-10 17:27:30 |
|
2022-10-11 13:11:41 |
|
2022-10-11 01:24:22 |
|
2022-07-23 09:27:33 |
|
2022-07-07 21:27:19 |
|
2022-07-06 12:56:22 |
|
2022-06-30 00:27:11 |
|
2022-06-27 17:27:08 |
|
2022-06-21 21:27:11 |
|