Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-5651

Опубликовано: 12 авг. 2024
Источник: redhat
CVSS3: 8.8
EPSS Средний

Описание

A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

Отчет

This vulnerability is specific to the Fence Agents Remediation operator and does not affect fence-agents itself.

Меры по смягчению последствий

Do not allow unprivileged users create FenceAgentsRemediation and FenceAgentsRemediationTemplate resources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Fence Agents Remediation Operatorfence-agents-remediation-operator-containerAffected
Fence Agents Remediation 0.4 for RHEL 8workload-availability/fence-agents-remediation-operator-bundleFixedRHSA-2024:545315.08.2024
Fence Agents Remediation 0.4 for RHEL 8workload-availability/fence-agents-remediation-rhel8-operatorFixedRHSA-2024:545315.08.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2290540fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution

EPSS

Процентиль: 94%
0.15589
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

CVSS3: 8.8
nvd
больше 1 года назад

A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

CVSS3: 8.8
debian
больше 1 года назад

A flaw was found in the Fence Agents Remediation operator. This vulner ...

CVSS3: 8.8
github
больше 1 года назад

A flaw was found in fence agents that rely on SSH/Telnet. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.

EPSS

Процентиль: 94%
0.15589
Средний

8.8 High

CVSS3

Уязвимость CVE-2024-5651