Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1292— The c_rehash script allows command injection

EPSS 37.78% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-1292

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
The c_rehash script allows command injection
Source: NVD (National Vulnerability Database)
Vulnerability Description
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSL 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSL是Openssl团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 存在操作系统命令注入漏洞,该漏洞源于c_rehash 脚本未正确清理 shell 元字符导致命令注入。攻击者利用该漏洞执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenSSLOpenSSL Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2) -

II. Public POCs for CVE-2022-1292

#POC DescriptionSource LinkShenlong Link
1CVE-2022-1292https://github.com/li8u99/CVE-2022-1292POC Details
2CVE-2022-1292 OpenSSL c_rehash Vulnerability - POChttps://github.com/alcaparra/CVE-2022-1292POC Details
3CVE-2022-1292 OpenSSL c_rehash Vulnerabilityhttps://github.com/rama291041610/CVE-2022-1292POC Details
4OpenSSLhttps://github.com/greek0x0/CVE-2022-1292POC Details
5Automation to validate the impact of the vulnerability CVE-2022-1292 on a specific system.https://github.com/und3sc0n0c1d0/CVE-2022-1292POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-1292

登录查看更多情报信息。

Same Patch Batch · OpenSSL · 2022-05-03 · 4 CVEs total

CVE-2022-1343OCSP_basic_verify may incorrectly verify the response signing certificate
CVE-2022-1434Incorrect MAC key used in the RC4-MD5 ciphersuite
CVE-2022-1473Resource leakage when decoding certificates and keys

IV. Related Vulnerabilities

V. Comments for CVE-2022-1292

No comments yet


Leave a comment