Bug 2271898 (CVE-2024-3019)

Summary: CVE-2024-3019 pcp: exposure of the redis server backend allows remote command execution via pmproxy
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2271899    
Bug Blocks: 2243651    

Description Guilherme de Almeida Suckevicz 2024-03-27 17:17:32 UTC
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user.

This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface.

This issue affects PCP versions 4.3.4 and newer.

Upstream patch:
https://github.com/performancecopilot/pcp/commit/3bde240a2acc85e63e2f7813330713dd9b59386e

Comment 1 Guilherme de Almeida Suckevicz 2024-03-27 17:17:51 UTC
Created pcp tracking bugs for this issue:

Affects: fedora-all [bug 2271899]

Comment 3 errata-xmlrpc 2024-04-30 14:40:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2566 https://access.redhat.com/errata/RHSA-2024:2566

Comment 4 errata-xmlrpc 2024-05-22 11:40:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:3264 https://access.redhat.com/errata/RHSA-2024:3264

Comment 5 errata-xmlrpc 2024-05-23 09:18:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:3322 https://access.redhat.com/errata/RHSA-2024:3322

Comment 6 errata-xmlrpc 2024-05-23 09:24:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:3321 https://access.redhat.com/errata/RHSA-2024:3321

Comment 7 errata-xmlrpc 2024-05-23 09:37:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:3325 https://access.redhat.com/errata/RHSA-2024:3325

Comment 8 errata-xmlrpc 2024-05-23 09:39:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:3323 https://access.redhat.com/errata/RHSA-2024:3323

Comment 9 errata-xmlrpc 2024-05-23 09:43:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:3324 https://access.redhat.com/errata/RHSA-2024:3324

Comment 10 errata-xmlrpc 2024-05-28 12:42:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:3392 https://access.redhat.com/errata/RHSA-2024:3392