Bug 2327749 (CVE-2024-30896)

Summary: CVE-2024-30896 InfluxDB: Privilege Escalation via Authorization Token in InfluxDB
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adudiak, alcohan, eglynn, gparvin, jjoyce, jschluet, jwendell, kshier, lhh, lsvaty, mburns, mgarciac, mrajanna, muagarwa, njean, omaciel, owatkins, pahickey, pgrist, rcernich, rhaigner, rhos-maint, stcannon, twalsh, yguenane, ypadia
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in InfluxDB. This vulnerability allows privilege escalation, leading to unrestricted access to the InfluxDB instance via improper authorization token management. Attackers with a valid allAccess token can enumerate and obtain operator-level tokens.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-11-21 05:01:00 UTC
InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. NOTE: the supplier indicates that this is intentional but is a "poor design choice" that will be changed in a future release.