Description
Elektra is an opinionated Openstack Dashboard for Operators and Consumers of Openstack Services. A code injection vulnerability was found in the live search functionality of the Ruby on Rails based Elektra web application. An authenticated user can craft a search term containing Ruby code, which later flows into an `eval` sink which executes the code. Fixed in commit 8bce00be93b95a6512ff68fe86bf9554e486bc02.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/sapcc/elektra/security/advisories/GHSA-6j2h-486h-487q
Patch x_refsource_misc
https://github.com/sapcc/elektra/commit/49aea3b365082681558bf3bf7bf4a51766cfc44d
Patch x_refsource_misc
https://github.com/sapcc/elektra/commit/8bce00be93b95a6512ff68fe86bf9554e486bc02
Scores
CVSS v3
9.6
EPSS
0.0021
EPSS Percentile
43.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (1)
sapcc/elektra
< 8bce00be93b95a6512ff68fe86bf9554e486bc02
Published
Aug 01, 2024
Tracked Since
Feb 18, 2026