Neat vuln in Fail2Ban.
https://gist.github.com/R-Security/1c707a08f9c7f9a91d9d84b5010aaed2
Fail2Ban 0.11.2 contains a vulnerability that allows an attacker with the ability to influence logged input (e.g., authentication logs, service logs processed by Fail2Ban filters) to inject specially crafted patterns that lead to command execution within the Fail2Ban action processing pipeline.
Because Fail2Ban actions typically run with root privileges, this can result in privilege escalation, allowing an attacker to execute commands with elevated permissions.
The issue arises from insufficient sanitization of variables passed into action scripts under certain configurations, allowing malicious input to propagate into shell execution.
@cR0w c’mon, why isn’t this called fail2shell with a snazzy website?
@neilmadden @cR0w because anyone running a 5 year old fail2ban install has already been owned by something else. It's barely worth a CVE. I have no idea why these are issued for non-supported versions.
@gnyman @neilmadden @cR0w my server is older than 5 years too. But it's on the Internet so I patch that shit.
@falken
yes patching is required and esm provides security patches