fkie_cve-2024-45044
Vulnerability from fkie_nvd
Published
2024-09-10 15:15
Modified
2024-09-10 15:50
Summary
Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. "w" for "whoami") the ACL check did not apply to the full form (i.e. "whoami") but to the abbreviated form (i.e. "w"). If the command ACL is configured with negative ACL that should forbid using the "whoami" command, you could still use "w" or "who" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \"w\" for \"whoami\") the ACL check did not apply to the full form (i.e. \"whoami\") but to the abbreviated form (i.e. \"w\"). If the command ACL is configured with negative ACL that should forbid using the \"whoami\" command, you could still use \"w\" or \"who\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur."
    },
    {
      "lang": "es",
      "value": "Bareos es un software de c\u00f3digo abierto para realizar copias de seguridad, archivar y recuperar datos de sistemas operativos. Cuando hay una ACL de comando y un usuario ejecuta un comando en bconsole utilizando una abreviatura (es decir, \"w\" para \"whoami\"), la comprobaci\u00f3n de la ACL no se aplica a la forma completa (es decir, \"whoami\"), sino a la forma abreviada (es decir, \"w\"). Si la ACL de comando est\u00e1 configurada con una ACL negativa que deber\u00eda prohibir el uso del comando \"whoami\", a\u00fan podr\u00eda usar \"w\" o \"who\" como comando correctamente. Las correcciones para el problema se incluyen en las versiones 23.0.4, 22.1.6 y 21.1.11 de Bareos. Si solo se utilizan ACL de comando positivas sin ninguna negaci\u00f3n, el problema no ocurre."
    }
  ],
  "id": "CVE-2024-45044",
  "lastModified": "2024-09-10T15:50:47.237",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-09-10T15:15:18.217",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/bareos/bareos/pull/1875"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-285"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…