CVE-2022-1292 (CNNVD-202205-1962)
中文标题:
OpenSSL 操作系统命令注入漏洞
英文标题:
The c_rehash script allows command injection
漏洞描述
中文描述:
OpenSSL是Openssl团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 存在操作系统命令注入漏洞,该漏洞源于c_rehash 脚本未正确清理 shell 元字符导致命令注入。攻击者利用该漏洞执行任意命令。
英文描述:
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| OpenSSL | OpenSSL | Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2) | - | - |
cpe:2.3:a:openssl:openssl:fixed_in_openssl_3.0.3_(affected_3.0.0,3.0.1,3.0.2):*:*:*:*:*:*:*
|
| OpenSSL | OpenSSL | Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n) | - | - |
cpe:2.3:a:openssl:openssl:fixed_in_openssl_1.1.1o_(affected_1.1.1-1.1.1n):*:*:*:*:*:*:*
|
| OpenSSL | OpenSSL | Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd) | - | - |
cpe:2.3:a:openssl:openssl:fixed_in_openssl_1.0.2ze_(affected_1.0.2-1.0.2zd):*:*:*:*:*:*:*
|
| siemens | brownfield_connectivity_gateway | * | - | - |
cpe:2.3:a:siemens:brownfield_connectivity_gateway:*:*:*:*:*:*:*:*
|
| openssl | openssl | * | - | - |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | - | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
|
| netapp | clustered_data_ontap | - | - | - |
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
|
| netapp | clustered_data_ontap_antivirus_connector | - | - | - |
cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
|
| netapp | oncommand_insight | - | - | - |
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
|
| netapp | oncommand_workflow_automation | - | - | - |
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
|
| netapp | santricity_smi-s_provider | - | - | - |
cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
|
| netapp | smi-s_provider | - | - | - |
cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
|
| netapp | snapcenter | - | - | - |
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
|
| netapp | snapmanager | - | - | - |
cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:hyper-v:*:*
|
| netapp | solidfire\,_enterprise_sds_\&_hci_storage_node | - | - | - |
cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:*
|
| netapp | solidfire_\&_hci_management_node | - | - | - |
cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*
|
| netapp | a700s_firmware | - | - | - |
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h300s_firmware | - | - | - |
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h500s_firmware | - | - | - |
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h700s_firmware | - | - | - |
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h300e_firmware | - | - | - |
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
|
| netapp | h500e_firmware | - | - | - |
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
|
| netapp | h700e_firmware | - | - | - |
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
|
| netapp | h410s_firmware | - | - | - |
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
|
| netapp | aff_8300_firmware | - | - | - |
cpe:2.3:o:netapp:aff_8300_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas_8300_firmware | - | - | - |
cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*
|
| netapp | aff_8700_firmware | - | - | - |
cpe:2.3:o:netapp:aff_8700_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas_8700_firmware | - | - | - |
cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*
|
| netapp | aff_a400_firmware | - | - | - |
cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*
|
| netapp | fabric-attached_storage_a400_firmware | - | - | - |
cpe:2.3:o:netapp:fabric-attached_storage_a400_firmware:-:*:*:*:*:*:*:*
|
| netapp | a250_firmware | - | - | - |
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
|
| netapp | aff_500f_firmware | - | - | - |
cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas_500f_firmware | - | - | - |
cpe:2.3:o:netapp:fas_500f_firmware:-:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.4.0.0 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
|
| oracle | mysql_server | * | - | - |
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
| oracle | mysql_workbench | * | - | - |
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 35 | - | - |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 36 | - | - |
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
nvd.nist.gov
CVSS评分详情
3.1 (adp)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2022-1292 |
2025-11-11 15:21:14 | 2025-11-11 07:37:12 |
| NVD | nvd_CVE-2022-1292 |
2025-11-11 14:58:17 | 2025-11-11 07:45:29 |
| CNNVD | cnnvd_CNNVD-202205-1962 |
2025-11-11 15:10:53 | 2025-11-11 07:57:16 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202205-1962
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 41
- references_count: 14 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']