cve-2024-45044
Vulnerability from cvelistv5
Published
2024-09-10 14:57
Modified
2024-09-10 19:23
Summary
Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. "w" for "whoami") the ACL check did not apply to the full form (i.e. "whoami") but to the abbreviated form (i.e. "w"). If the command ACL is configured with negative ACL that should forbid using the "whoami" command, you could still use "w" or "who" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:bareos:bareos:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "bareos",
            "vendor": "bareos",
            "versions": [
              {
                "lessThan": "23.0.4",
                "status": "affected",
                "version": "23.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "22.1.6",
                "status": "affected",
                "version": "22.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "21.1.11",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45044",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T19:21:00.578548Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-10T19:23:58.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "bareos",
          "vendor": "bareos",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 23.0.0, \u003c 23.0.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.0.0, \u003c 22.1.6"
            },
            {
              "status": "affected",
              "version": "\u003c 21.1.11"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \"w\" for \"whoami\") the ACL check did not apply to the full form (i.e. \"whoami\") but to the abbreviated form (i.e. \"w\"). If the command ACL is configured with negative ACL that should forbid using the \"whoami\" command, you could still use \"w\" or \"who\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-10T14:57:57.464Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8"
        },
        {
          "name": "https://github.com/bareos/bareos/pull/1875",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/bareos/bareos/pull/1875"
        },
        {
          "name": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5"
        }
      ],
      "source": {
        "advisory": "GHSA-jfww-q346-r2r8",
        "discovery": "UNKNOWN"
      },
      "title": "Bareos\u0027s negative command ACLs can be circumvented by abbreviating commands"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-45044",
    "datePublished": "2024-09-10T14:57:57.464Z",
    "dateReserved": "2024-08-21T17:53:51.331Z",
    "dateUpdated": "2024-09-10T19:23:58.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-45044\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-09-10T15:15:18.217\",\"lastModified\":\"2024-09-10T15:50:47.237\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \\\"w\\\" for \\\"whoami\\\") the ACL check did not apply to the full form (i.e. \\\"whoami\\\") but to the abbreviated form (i.e. \\\"w\\\"). If the command ACL is configured with negative ACL that should forbid using the \\\"whoami\\\" command, you could still use \\\"w\\\" or \\\"who\\\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.\"},{\"lang\":\"es\",\"value\":\"Bareos es un software de c\u00f3digo abierto para realizar copias de seguridad, archivar y recuperar datos de sistemas operativos. Cuando hay una ACL de comando y un usuario ejecuta un comando en bconsole utilizando una abreviatura (es decir, \\\"w\\\" para \\\"whoami\\\"), la comprobaci\u00f3n de la ACL no se aplica a la forma completa (es decir, \\\"whoami\\\"), sino a la forma abreviada (es decir, \\\"w\\\"). Si la ACL de comando est\u00e1 configurada con una ACL negativa que deber\u00eda prohibir el uso del comando \\\"whoami\\\", a\u00fan podr\u00eda usar \\\"w\\\" o \\\"who\\\" como comando correctamente. Las correcciones para el problema se incluyen en las versiones 23.0.4, 22.1.6 y 21.1.11 de Bareos. Si solo se utilizan ACL de comando positivas sin ninguna negaci\u00f3n, el problema no ocurre.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"references\":[{\"url\":\"https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/bareos/bareos/pull/1875\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8\",\"source\":\"security-advisories@github.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.