Bug 2271898 (CVE-2024-3019)
Summary: | CVE-2024-3019 pcp: exposure of the redis server backend allows remote command execution via pmproxy | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | Keywords: | Security |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2271899 | ||
Bug Blocks: | 2243651 |
Description
Guilherme de Almeida Suckevicz
2024-03-27 17:17:32 UTC
Created pcp tracking bugs for this issue: Affects: fedora-all [bug 2271899] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2566 https://access.redhat.com/errata/RHSA-2024:2566 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3264 https://access.redhat.com/errata/RHSA-2024:3264 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:3322 https://access.redhat.com/errata/RHSA-2024:3322 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3321 https://access.redhat.com/errata/RHSA-2024:3321 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:3325 https://access.redhat.com/errata/RHSA-2024:3325 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:3323 https://access.redhat.com/errata/RHSA-2024:3323 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:3324 https://access.redhat.com/errata/RHSA-2024:3324 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:3392 https://access.redhat.com/errata/RHSA-2024:3392 |