Bug ID | 1232040 |
---|---|
Summary | VUL-0: CVE-2024-9050: NetworkManager-libreswan: improper sanitization of the VPN configuration of a local unprivileged user can lead to local privilege escalation via the leftupdown key |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/425285/ |
OS | Other |
Status | NEW |
Severity | Major |
Priority | P5 - None |
Component | Security |
Assignee | dimstar@opensuse.org |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | camila.matos@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-9050 https://bugzilla.redhat.com/show_bug.cgi?id=2313828 https://www.cve.org/CVERecord?id=CVE-2024-9050 https://access.redhat.com/security/cve/CVE-2024-9050 https://access.redhat.com/errata/RHSA-2024:8312