7.3

CVE-2024-2947

A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability, resulting in privilege escalation. This issue affects Cockpit versions 270 and newer.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/cockpit-project/cockpit/
Package cockpit
Default Statusunaffected
Version < *
Version 270
Status affected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:310.4-1.el8_10
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:311.2-1.el9_4
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:311.2-1.el9_4
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.071
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.