Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-52336

Опубликовано: 26 нояб. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A script injection vulnerability was identified in the Tuned package. The instance_create() D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with script_pre or script_post options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

Отчет

The instance_create() D-Bus method has been added via upstream commit cddcd233 and was first part of version tag v2.23.0. Hence, versions of Tuned before 2.23.0 are unaffected. Also, note that the initial versions already contained support for the script option parameters and the instance_name parameter.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Fast Datapath for RHEL 7tunedNot affected
Red Hat Enterprise Linux 10tunedAffected
Red Hat Enterprise Linux 6tunedNot affected
Red Hat Enterprise Linux 7tunedNot affected
Red Hat Enterprise Linux 8tunedNot affected
Fast Datapath for Red Hat Enterprise Linux 8tunedFixedRHSA-2025:088003.02.2025
Fast Datapath for Red Hat Enterprise Linux 9tunedFixedRHSA-2025:087903.02.2025
Red Hat Enterprise Linux 9tunedFixedRHSA-2024:1038426.11.2024
Red Hat Enterprise Linux 9tunedFixedRHSA-2024:1038426.11.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-269
https://bugzilla.redhat.com/show_bug.cgi?id=2324540tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root

EPSS

Процентиль: 15%
0.00047
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
7 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

CVSS3: 7.8
nvd
7 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

CVSS3: 7.8
msrc
6 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
7 месяцев назад

A script injection vulnerability was identified in the Tuned package. ...

CVSS3: 7.8
github
7 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

EPSS

Процентиль: 15%
0.00047
Низкий

7.8 High

CVSS3