7.8 CVE-2022-2735
Patch
A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
https://nvd.nist.gov/vuln/detail/CVE-2022-2735
Categories
CWE-276 : Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files. The architecture needs to access and modification attributes for files to only those users who actually require those actions. Executables installed world-writable. Home directories installed world-readable. World-writable log files allow information loss; world-readable file has cleartext passwords. World-readable directory. Windows product uses insecure permissions when installing on Solaris (genesis: port error). Insecure permissions for a shared secret key file. Overlaps cryptographic problem. Default permissions of a device allow IP spoofing.
References
af854a3a-2127-422b-91ae-364da2661108 Patch
https://access.redhat.com/security/cve/CVE-2022-2735 Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2116815 Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5226 Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/09/01/4 Mailing List Release Notes Third Party Advisory |
secalert@redhat.com Patch
https://access.redhat.com/security/cve/CVE-2022-2735 Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2116815 Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5226 Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/09/01/4 Mailing List Release Notes Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:* | >= 0.10.5 | <= 0.11.3 |
Configuration 2 | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://bugzilla.redhat.com/show_bug.cgi?id=2116815 |
https://bugzilla.redhat.com/show_bug.cgi?id=2116815 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
1 | Accessing Functionality Not Properly Constrained by ACLs |
High |
127 | Directory Indexing |
Medium |
81 | Web Server Logs Tampering |
High |
MITRE
Techniques
id | description |
---|---|
T1083 | File and Directory Discovery |
T1574.010 | Hijack Execution Flow: ServicesFile Permissions Weakness |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
M1018 | Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able. |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.