[Bug 1198195] New: VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command injection
http://bugzilla.opensuse.org/show_bug.cgi?id=1198195 Bug ID: 1198195 Summary: VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command injection Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other URL: https://smash.suse.de/issue/328131/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: cgoll@suse.com Reporter: cathy.hu@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#2072029 An attacker need only have READ-level authorization to a vulnerable daemon using the CLAIMTOBE authentication method. This means they are able to run tools like condor_q or condor_status. Many pools do not restrict who can issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in the default configuration. Thus, it is likely that an attacker could execute this command remotely from an untrusted network, unless prevented by a firewall or other network-level access controls. Reference: https://htcondor.org/security/vulnerabilities/HTCONDOR-2022-0003 References: https://bugzilla.redhat.com/show_bug.cgi?id=2072029 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26110 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110 http://www.cvedetails.com/cve/CVE-2022-26110/ https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2022... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1198195 http://bugzilla.opensuse.org/show_bug.cgi?id=1198195#c1 --- Comment #1 from Hu <cathy.hu@suse.com> --- Affected: - openSUSE:Factory/htcondor -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com