vendor:
SLO-Generator
by:
Kiran Ghimire
7.8
CVSS
HIGH
Code Execution
94
CWE
Product Name: SLO-Generator
Affected Version From: <= 2.0.0
Affected Version To:
Patch Exists: NO
Related CWE: CVE-2021-22557
CPE:
Platforms Tested: Linux
2021
Google SLO-Generator 2.0.0 – Code Execution
The Google SLO-Generator version 2.0.0 is vulnerable to code execution. This can be exploited by an attacker by crafting a specially crafted YAML file that contains malicious code. When this file is processed by the SLO-Generator, it will execute the code within the 'apply:os.system' field. This allows an attacker to execute arbitrary commands on the host system.
Mitigation:
To mitigate this vulnerability, users are advised to update to a version of the SLO-Generator that is not affected by this issue. It is recommended to always use the latest stable release of the software and to follow best practices for secure configuration and deployment.