CVE-2021-42561

HIGH

Mitre Caldera < 2.8.1 - Injection

Title source: rule
STIX 2.1

Description

An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.

Exploits (1)

nomisec WRITEUP
by mbadanoiu · poc
https://github.com/mbadanoiu/CVE-2021-42561

References (2)

Core 2
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/mitre/caldera/releases

Scores

CVSS v3 8.8
EPSS 0.1029
EPSS Percentile 93.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-74
Status published
Products (1)
mitre/caldera < 2.8.1
Published Jan 12, 2022
Tracked Since Feb 18, 2026