CVE-2021-28249

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link Resource
https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ca:ehealth_performance_manager:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:32

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 CWE-426

29 Mar 2021, 15:52

Type Values Removed Values Added
CPE cpe:2.3:a:ca:ehealth_performance_manager:*:*:*:*:*:*:*:*
References (MISC) https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ - (MISC) https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 8.8
CWE CWE-269

26 Mar 2021, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-26 08:15

Updated : 2024-04-11 01:11


NVD link : CVE-2021-28249

Mitre link : CVE-2021-28249

CVE.ORG link : CVE-2021-28249


JSON object : View

Products Affected

ca

  • ehealth_performance_manager
CWE
CWE-426

Untrusted Search Path