Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-5332

Опубликовано: 04 дек. 2023
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

A command injection flaw was found in Hashicorp's Consul script check configuration option. If the API is enabled and exposed through a public interface, it is possible to achieve remote code execution.

Меры по смягчению последствий

To mitigate this issue, the '-enable-script-checks' option must be removed to disable the vulnerable component. It's also possible to limit exploitability by using the '-enable-local-script-checks' option to restrict the vulnerable option to only local checks and/or by binding the API to a loopback interface.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Affected
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8Not affected
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operatorNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/loki-rhel8-operatorNot affected
mirror registry for Red Hat OpenShiftmirror-registry-containerAffected
OpenShift API for Data Protectionoadp/oadp-kubevirt-velero-plugin-rhel8Not affected
OpenShift API for Data Protectionoadp/oadp-mustgather-rhel8Not affected
OpenShift API for Data Protectionoadp/oadp-rhel8-operatorNot affected
OpenShift API for Data Protectionoadp/oadp-velero-plugin-for-aws-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=2252882consul: Command injection through script checks option

EPSS

Процентиль: 4%
0.00021
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 1 года назад

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

CVSS3: 5.9
nvd
больше 1 года назад

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

CVSS3: 5.9
debian
больше 1 года назад

Patch in third party library Consul requires 'enable-script-checks' to ...

CVSS3: 5.9
github
больше 1 года назад

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

EPSS

Процентиль: 4%
0.00021
Низкий

8.1 High

CVSS3