A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.starwindsoftware.com/security/sw-20220203-0001/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T04:13:56.675Z
Reserved: 2022-02-06T00:00:00
Link: CVE-2022-24552

No data.

Status : Modified
Published: 2022-02-06T21:15:08.073
Modified: 2024-11-21T06:50:39.317
Link: CVE-2022-24552

No data.