For CDC 5.4.0 and later, we shipped a dzcheck.sample for customer intending to use the dzdo dzcheck feature. The sample is a perl script intended as an example, and only as an example.
We have since discovered that the perl logger call may still launch a shell which means it may still be subject to the shell variable substitution attack if not properly implemented.
Problem: For CDC 5.4.0 and later, Centrify shipped a dzcheck.sample script for customers intending to use the dzdo dzcheck feature. We have since discovered that the perl logger call may still launch a shell which means it may still be subject to the shell variable substitution attack if not properly implemented.
Solution: Ensure to follow the installation and configuration documentation exactly as described. If implementation isn't completed properly, this vulnerability can become apparent.
Note: The sample perl script is intended only as an example, not for production use.