| Summary | The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd). |
|---|---|
| Publication Date | May 4, 2022, 1:15 a.m. |
| Registration Date | May 4, 2022, 10 a.m. |
| Last Update | Nov. 21, 2024, 3:40 p.m. |
| CVSS3.1 : CRITICAL | |
| スコア | 9.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 10.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 | 3.0.3 | |||
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.0.2 | 1.0.2ze | |||
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.1.1 | 1.1.1o | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* | |||||
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* | |||||
| cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:* | |||||
| cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:hyper-v:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* | ||||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* | ||||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* | ||||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:aff_8300_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:aff_8300:-:*:*:*:*:*:*:* | ||||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:* | ||||
| Configuration14 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:aff_8700_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:aff_8700:-:*:*:*:*:*:*:* | ||||
| Configuration15 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:* | ||||
| Configuration16 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:* | ||||
| Configuration17 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:fabric-attached_storage_a400_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:fabric-attached_storage_a400:-:*:*:*:*:*:*:* | ||||
| Configuration18 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:* | ||||
| Configuration19 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:* | ||||
| Configuration20 | or higher | or less | more than | less than | |
| cpe:2.3:o:netapp:fas_500f_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:netapp:fas_500f:-:*:*:*:*:*:*:* | ||||
| Configuration21 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* | 8.0.0 | 8.0.29 | |||
| cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* | 8.0.29 | ||||
| cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* | 5.0.0 | 5.7.38 | |||
| Configuration22 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | |||||
| Title | OpenSSL の c_rehash スクリプトにおけるシェルのメタ文字のサニタイズに関する脆弱性 |
|---|---|
| Summary | OpenSSL の c_rehash スクリプトには、コマンドインジェクションを防ぐためのシェルのメタ文字のサニタイズに関する脆弱性が存在します。 |
| Possible impacts | 攻撃者により、スクリプトの権限で任意のコマンドを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | May 3, 2022, midnight |
| Registration Date | May 16, 2022, 5:15 p.m. |
| Last Update | July 19, 2023, 3:18 p.m. |
| OpenSSL Project |
| OpenSSL 1.0.2 から 1.0.2zd |
| OpenSSL 1.1.1 から 1.1.1n |
| OpenSSL 3.0.0 |
| OpenSSL 3.0.1 |
| OpenSSL 3.0.2 |
| 日立 |
| 日立アドバンストサーバ HA8000V シリーズ |
| No | Changed Details | Date of change |
|---|---|---|
| 4 | [2023年03月22日] 参考情報:JVN (JVNVU#99752892) を追加 参考情報:ICS-CERT ADVISORY (ICSA-23-075-01) を追加 |
March 22, 2023, 1:52 p.m. |
| 5 | [2022年06月16日] 参考情報:JVN (JVNVU#99464755) を追加 参考情報:ICS-CERT ADVISORY (ICSA-23-166-11) を追加 |
June 16, 2023, 11:29 a.m. |
| 3 | [2023年02月17日] 参考情報:JVN (JVNVU#97514209) を追加 参考情報:ICS-CERT ADVISORY (ICSA-23-047-03) を追加 |
Feb. 17, 2023, 12:23 p.m. |
| 6 | [2023年07月18日] 参考情報:JVN (JVNVU#95292697) を追加 参考情報:ICS-CERT ADVISORY (ICSA-23-194-01) を追加 |
July 19, 2023, 3:17 p.m. |
| 2 | [2022年07月05日] 影響を受けるシステム:ベンダ情報の追加に伴い内容を更新 ベンダ情報:日立 (hitachi-sec-2022-213) を追加 |
July 5, 2022, 11:02 a.m. |
| 1 | [2022年05月16日] 掲載 |
May 16, 2022, 5:15 p.m. |