
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-3621 is a security vulnerability discovered in SSSD (System Security Services Daemon), specifically affecting the sssctl command. The vulnerability was disclosed on June 23, 2021, and affects the logs-fetch and cache-expire subcommands of sssctl. The flaw was found in SSSD versions prior to 2.6.0 (SSSD Release, NVD).
The vulnerability stems from the sssctl_run_command() function, which is a wrapper for running commands via a shell using glibc's system() function call. The sssctl_cache_expire() and sssctl_logs_fetch() functions allow user-provided arguments and pass them directly to sssctl_run_command() without proper sanitization, making them vulnerable to shell command injection (Red Hat Bugzilla).
The vulnerability could allow an attacker to gain root access by tricking the root user into running a specially crafted sssctl command, such as via sudo. The highest threat from this vulnerability affects system confidentiality, integrity, and availability (CVE Mitre).
The vulnerability was fixed in SSSD version 2.6.0 by replacing the system() call with execvp() to avoid execution of user-supplied commands. Various Linux distributions have released security updates to address this vulnerability, including Red Hat Enterprise Linux via RHSA-2021:3151 and Debian via DLA-3436-1 (SSSD Release, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."