
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawkinvoke (built from tools/hawkinvoke.c), intended to provide privileged access for web operations (NVD).
The vulnerability exists in the hawkinvoke binary component of ClusterLabs Hawk, which is used to provide privileged access for web operations. The issue was addressed by removing the hawkinvoke binary and replacing it with a more secure command execution method using capture3 for running system commands instead of the runas construct (GitHub).
The vulnerability could potentially allow unauthorized privileged access through the web interface, affecting the security of the HA Web Konsole system (NVD).
The issue has been fixed in subsequent releases by removing the hawkinvoke binary and implementing a more secure command execution method. The fix includes using capture3 for running system commands instead of the runas construct, removing unnecessary chmods, and sanitizing filename handling during hbreport uploads in the GUI (GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."