Bug 2271898 (CVE-2024-3019) - CVE-2024-3019 pcp: exposure of the redis server backend allows remote command execution via pmproxy
Summary: CVE-2024-3019 pcp: exposure of the redis server backend allows remote command...
Keywords:
Status: NEW
Alias: CVE-2024-3019
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2271899
Blocks: 2243651
TreeView+ depends on / blocked
 
Reported: 2024-03-27 17:17 UTC by Guilherme de Almeida Suckevicz
Modified: 2024-05-31 12:58 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:2566 0 None None None 2024-04-30 14:40:31 UTC
Red Hat Product Errata RHSA-2024:3264 0 None None None 2024-05-22 11:40:30 UTC
Red Hat Product Errata RHSA-2024:3321 0 None None None 2024-05-23 09:24:39 UTC
Red Hat Product Errata RHSA-2024:3322 0 None None None 2024-05-23 09:18:16 UTC
Red Hat Product Errata RHSA-2024:3323 0 None None None 2024-05-23 09:39:22 UTC
Red Hat Product Errata RHSA-2024:3324 0 None None None 2024-05-23 09:43:20 UTC
Red Hat Product Errata RHSA-2024:3325 0 None None None 2024-05-23 09:38:00 UTC
Red Hat Product Errata RHSA-2024:3392 0 None None None 2024-05-28 12:42:39 UTC

Description Guilherme de Almeida Suckevicz 2024-03-27 17:17:32 UTC
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user.

This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface.

This issue affects PCP versions 4.3.4 and newer.

Upstream patch:
https://github.com/performancecopilot/pcp/commit/3bde240a2acc85e63e2f7813330713dd9b59386e

Comment 1 Guilherme de Almeida Suckevicz 2024-03-27 17:17:51 UTC
Created pcp tracking bugs for this issue:

Affects: fedora-all [bug 2271899]

Comment 3 errata-xmlrpc 2024-04-30 14:40:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2566 https://access.redhat.com/errata/RHSA-2024:2566

Comment 4 errata-xmlrpc 2024-05-22 11:40:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:3264 https://access.redhat.com/errata/RHSA-2024:3264

Comment 5 errata-xmlrpc 2024-05-23 09:18:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:3322 https://access.redhat.com/errata/RHSA-2024:3322

Comment 6 errata-xmlrpc 2024-05-23 09:24:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:3321 https://access.redhat.com/errata/RHSA-2024:3321

Comment 7 errata-xmlrpc 2024-05-23 09:37:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:3325 https://access.redhat.com/errata/RHSA-2024:3325

Comment 8 errata-xmlrpc 2024-05-23 09:39:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:3323 https://access.redhat.com/errata/RHSA-2024:3323

Comment 9 errata-xmlrpc 2024-05-23 09:43:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:3324 https://access.redhat.com/errata/RHSA-2024:3324

Comment 10 errata-xmlrpc 2024-05-28 12:42:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:3392 https://access.redhat.com/errata/RHSA-2024:3392


Note You need to log in before you can comment on or make changes to this bug.