{"id":"CVE-2021-32090","details":"The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter.","aliases":["GHSA-hpr6-f4vq-mxch","PYSEC-2021-101"],"modified":"2026-03-10T23:35:00.685744Z","published":"2021-05-07T05:15:08.210Z","references":[{"type":"WEB"},{"type":"EVIDENCE","url":"https://blog.sonarsource.com/hack-the-stack-with-localstack"},{"type":"EVIDENCE","url":"https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/localstack/localstack","events":[{"introduced":"0"},{"last_affected":"776465ce56d8e6cb2c2464c316f82733890007ba"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.12.6"}]}}],"versions":["localstack-0.1.0","v0.1.16","v0.10.0","v0.10.2","v0.10.3","v0.10.4","v0.10.5","v0.10.6","v0.10.8","v0.10.9","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.11.5","v0.11.6","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.12.4","v0.12.5","v0.12.6","v0.2.0","v0.3.0","v0.3.10"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32090.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}