Bug 2055326 (CVE-2022-24407)
| Summary: | CVE-2022-24407 cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | anon.amish, aos-bugs, asoldano, atangrin, bbaranow, bdettelb, bmaxwell, brian.stansberry, caswilli, cdewolf, chazlett, crypto-team, darran.lofthouse, dhalasz, dkreling, dkuc, dosoudil, eleandro, fjansen, fj-lsoft-oss, fjuma, iweiss, jburrell, jjelen, jkoehler, jochrist, jpallich, jperkins, jwong, jwon, kaycoth, krathod, kwills, kyoshida, lgao, michal.skrivanek, micjohns, mperina, msochure, msvehla, nobody, nwallace, pjindal, pmackay, psegedy, rfreiman, rguimara, rstancel, rsvoboda, sbonazzo, security-response-team, smaestri, ssorce, sthirugn, tcarlin, tfister, tkasparek, tom.jenkinson, tsasak, vanmeeuwen+fedora, vkrizan, vkumar, vmugicag, yborgess |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | cyrus-sasl 2.1.28 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in the SQL plugin shipped with Cyrus SASL. The vulnerability occurs due to failure to properly escape SQL input and leads to an improper input validation vulnerability. This flaw allows an attacker to execute arbitrary SQL commands and the ability to change the passwords for other accounts allowing escalation of privileges.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-04-07 11:27:34 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2055841, 2055842, 2055843, 2055844, 2055845, 2055846, 2055847, 2055848, 2057311, 2057312, 2057334, 2057447, 2059596, 2059600 | ||
| Bug Blocks: | 2055327 | ||
|
Description
Guilherme de Almeida Suckevicz
2022-02-16 17:32:37 UTC
Marian, I think it is important to state that an "authenticated remote attacker" is needed, as this flaw occurs only on password change and I believe you need to be authenticated to perform it. Ref: https://github.com/cyrusimap/cyrus-sasl/releases/tag/cyrus-sasl-2.1.28 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 Created cyrus-sasl tracking bugs for this issue: Affects: fedora-all [bug 2057334] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0658 https://access.redhat.com/errata/RHSA-2022:0658 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0668 https://access.redhat.com/errata/RHSA-2022:0668 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0666 https://access.redhat.com/errata/RHSA-2022:0666 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:0730 https://access.redhat.com/errata/RHSA-2022:0730 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0731 https://access.redhat.com/errata/RHSA-2022:0731 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Extended Lifecycle Support Via RHSA-2022:0780 https://access.redhat.com/errata/RHSA-2022:0780 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:0841 https://access.redhat.com/errata/RHSA-2022:0841 This issue has been addressed in the following products: RHINT Camel-K 1.6.4 Via RHSA-2022:1029 https://access.redhat.com/errata/RHSA-2022:1029 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2022:1263 https://access.redhat.com/errata/RHSA-2022:1263 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-24407 |