CVE-2021-3621

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fedoraproject:sssd:2.6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

03 Nov 2025, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/02/msg00008.html -

21 Nov 2024, 06:22

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1975142 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1975142 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html - Third Party Advisory
References () https://sssd.io/release-notes/sssd-2.6.0.html - Release Notes, Third Party Advisory () https://sssd.io/release-notes/sssd-2.6.0.html - Release Notes, Third Party Advisory

04 Mar 2024, 22:58

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html - Third Party Advisory
CPE cpe:2.3:a:sssd:sssd:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:sssd:2.6.0:*:*:*:*:*:*:*
First Time Fedoraproject sssd

29 May 2023, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html -

Information

Published : 2021-12-23 21:15

Updated : 2025-11-03 21:15


NVD link : CVE-2021-3621

Mitre link : CVE-2021-3621

CVE.ORG link : CVE-2021-3621


JSON object : View

Products Affected

redhat

  • virtualization_host
  • enterprise_linux
  • virtualization
  • enterprise_linux_eus
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus

fedoraproject

  • fedora
  • sssd
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')