CVE-2024-45044 (GCVE-0-2024-45044)

Vulnerability from cvelistv5 – Published: 2024-09-10 14:57 – Updated: 2024-09-10 19:23
VLAI?
Title
Bareos's negative command ACLs can be circumvented by abbreviating commands
Summary
Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. "w" for "whoami") the ACL check did not apply to the full form (i.e. "whoami") but to the abbreviated form (i.e. "w"). If the command ACL is configured with negative ACL that should forbid using the "whoami" command, you could still use "w" or "who" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.
CWE
Assigner
Impacted products
Vendor Product Version
bareos bareos Affected: >= 23.0.0, < 23.0.4
Affected: >= 22.0.0, < 22.1.6
Affected: < 21.1.11
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:bareos:bareos:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "bareos",
            "vendor": "bareos",
            "versions": [
              {
                "lessThan": "23.0.4",
                "status": "affected",
                "version": "23.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "22.1.6",
                "status": "affected",
                "version": "22.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "21.1.11",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45044",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T19:21:00.578548Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-10T19:23:58.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "bareos",
          "vendor": "bareos",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 23.0.0, \u003c 23.0.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.0.0, \u003c 22.1.6"
            },
            {
              "status": "affected",
              "version": "\u003c 21.1.11"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \"w\" for \"whoami\") the ACL check did not apply to the full form (i.e. \"whoami\") but to the abbreviated form (i.e. \"w\"). If the command ACL is configured with negative ACL that should forbid using the \"whoami\" command, you could still use \"w\" or \"who\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-10T14:57:57.464Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8"
        },
        {
          "name": "https://github.com/bareos/bareos/pull/1875",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/bareos/bareos/pull/1875"
        },
        {
          "name": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5"
        }
      ],
      "source": {
        "advisory": "GHSA-jfww-q346-r2r8",
        "discovery": "UNKNOWN"
      },
      "title": "Bareos\u0027s negative command ACLs can be circumvented by abbreviating commands"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-45044",
    "datePublished": "2024-09-10T14:57:57.464Z",
    "dateReserved": "2024-08-21T17:53:51.331Z",
    "dateUpdated": "2024-09-10T19:23:58.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \\\"w\\\" for \\\"whoami\\\") the ACL check did not apply to the full form (i.e. \\\"whoami\\\") but to the abbreviated form (i.e. \\\"w\\\"). If the command ACL is configured with negative ACL that should forbid using the \\\"whoami\\\" command, you could still use \\\"w\\\" or \\\"who\\\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.\"}, {\"lang\": \"es\", \"value\": \"Bareos es un software de c\\u00f3digo abierto para realizar copias de seguridad, archivar y recuperar datos de sistemas operativos. Cuando hay una ACL de comando y un usuario ejecuta un comando en bconsole utilizando una abreviatura (es decir, \\\"w\\\" para \\\"whoami\\\"), la comprobaci\\u00f3n de la ACL no se aplica a la forma completa (es decir, \\\"whoami\\\"), sino a la forma abreviada (es decir, \\\"w\\\"). Si la ACL de comando est\\u00e1 configurada con una ACL negativa que deber\\u00eda prohibir el uso del comando \\\"whoami\\\", a\\u00fan podr\\u00eda usar \\\"w\\\" o \\\"who\\\" como comando correctamente. Las correcciones para el problema se incluyen en las versiones 23.0.4, 22.1.6 y 21.1.11 de Bareos. Si solo se utilizan ACL de comando positivas sin ninguna negaci\\u00f3n, el problema no ocurre.\"}]",
      "id": "CVE-2024-45044",
      "lastModified": "2024-09-10T15:50:47.237",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
      "published": "2024-09-10T15:15:18.217",
      "references": "[{\"url\": \"https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/bareos/bareos/pull/1875\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8\", \"source\": \"security-advisories@github.com\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-45044\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-09-10T15:15:18.217\",\"lastModified\":\"2024-09-10T15:50:47.237\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \\\"w\\\" for \\\"whoami\\\") the ACL check did not apply to the full form (i.e. \\\"whoami\\\") but to the abbreviated form (i.e. \\\"w\\\"). If the command ACL is configured with negative ACL that should forbid using the \\\"whoami\\\" command, you could still use \\\"w\\\" or \\\"who\\\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.\"},{\"lang\":\"es\",\"value\":\"Bareos es un software de c\u00f3digo abierto para realizar copias de seguridad, archivar y recuperar datos de sistemas operativos. Cuando hay una ACL de comando y un usuario ejecuta un comando en bconsole utilizando una abreviatura (es decir, \\\"w\\\" para \\\"whoami\\\"), la comprobaci\u00f3n de la ACL no se aplica a la forma completa (es decir, \\\"whoami\\\"), sino a la forma abreviada (es decir, \\\"w\\\"). Si la ACL de comando est\u00e1 configurada con una ACL negativa que deber\u00eda prohibir el uso del comando \\\"whoami\\\", a\u00fan podr\u00eda usar \\\"w\\\" o \\\"who\\\" como comando correctamente. Las correcciones para el problema se incluyen en las versiones 23.0.4, 22.1.6 y 21.1.11 de Bareos. Si solo se utilizan ACL de comando positivas sin ninguna negaci\u00f3n, el problema no ocurre.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"references\":[{\"url\":\"https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/bareos/bareos/pull/1875\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"title\": \"Bareos\u0027s negative command ACLs can be circumvented by abbreviating commands\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-285\", \"lang\": \"en\", \"description\": \"CWE-285: Improper Authorization\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8\"}, {\"name\": \"https://github.com/bareos/bareos/pull/1875\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/bareos/bareos/pull/1875\"}, {\"name\": \"https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5\"}], \"affected\": [{\"vendor\": \"bareos\", \"product\": \"bareos\", \"versions\": [{\"version\": \"\u003e= 23.0.0, \u003c 23.0.4\", \"status\": \"affected\"}, {\"version\": \"\u003e= 22.0.0, \u003c 22.1.6\", \"status\": \"affected\"}, {\"version\": \"\u003c 21.1.11\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-09-10T14:57:57.464Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \\\"w\\\" for \\\"whoami\\\") the ACL check did not apply to the full form (i.e. \\\"whoami\\\") but to the abbreviated form (i.e. \\\"w\\\"). If the command ACL is configured with negative ACL that should forbid using the \\\"whoami\\\" command, you could still use \\\"w\\\" or \\\"who\\\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.\"}], \"source\": {\"advisory\": \"GHSA-jfww-q346-r2r8\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45044\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T19:21:00.578548Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:bareos:bareos:*:*:*:*:*:*:*:*\"], \"vendor\": \"bareos\", \"product\": \"bareos\", \"versions\": [{\"status\": \"affected\", \"version\": \"23.0.0\", \"lessThan\": \"23.0.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"22.0.0\", \"lessThan\": \"22.1.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"21.1.11\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-10T19:23:04.892Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-45044\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-08-21T17:53:51.331Z\", \"datePublished\": \"2024-09-10T14:57:57.464Z\", \"dateUpdated\": \"2024-09-10T19:23:58.214Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…