{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-37425","assignerOrgId":"dbe78b00-5e7b-4fda-8748-329789ecfc5c","serial":1,"state":"PUBLISHED","dateUpdated":"2024-08-03T10:29:21.021Z","dateReserved":"2022-08-05T00:00:00.000Z","datePublished":"2022-10-28T15:09:21.268Z","assignerShortName":"blackberry"},"containers":{"cna":{"providerMetadata":{"orgId":"dbe78b00-5e7b-4fda-8748-329789ecfc5c","dateUpdated":"2024-07-05T19:09:00.000Z"},"title":"The FILES directive inside a VM template allows execution of uploaded files when the template is instantiated, resulting in a Remote Code Execution (RCE) attack.","datePublic":"2022-10-27T09:33:00.000Z","problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.","supportingMedia":[{"type":"text/html","base64":false,"value":"Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion."}]}],"references":[{"url":"https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/","name":"https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"CRITICAL","baseScore":9.9,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}}],"configurations":[{"lang":"en","value":"Regular users must be allowed to use the FILES directive inside the CONTEXT section of a VM template when instantiating a VM, (this is restricted by default to users in the oneadmin group). This could also be exploited by social engineering a user in the oneadmin group to start a VM from the malicious template.","supportingMedia":[{"type":"text/html","base64":false,"value":"Regular users must be allowed to use the FILES directive inside the CONTEXT section of a VM template when instantiating a VM, (this is restricted by default to users in the oneadmin group). This could also be exploited by social engineering a user in the oneadmin group to start a VM from the malicious template."}]}],"workarounds":[{"lang":"en","value":"Do not allow regular users to use the FILES directive inside their VM templates, instead set up a context files datastore, and allow users to upload and reference their files from that datastore, using the FILES_DS directive.","supportingMedia":[{"type":"text/html","base64":false,"value":"Do not allow regular users to use the FILES directive inside their VM templates, instead set up a context files datastore, and allow users to upload and reference their files from that datastore, using the FILES_DS directive."}]}],"solutions":[{"lang":"en","value":"Upgrade to OpenNebula 6.4.2 EE LTS and configure the CONTEXT_RESTRICTED_DIRS and CONTEXT_SAFE_DIRS properties in oned.conf","supportingMedia":[{"type":"text/html","base64":false,"value":"Upgrade to OpenNebula 6.4.2 EE LTS and configure the CONTEXT_RESTRICTED_DIRS and CONTEXT_SAFE_DIRS properties in oned.conf"}]}],"source":{"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:29:21.021Z"},"title":"CVE Program Container","references":[{"url":"https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/","name":"https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/","tags":["x_transferred"]}]}]}}