CVE Vulnerabilities

CVE-2024-45770

Improper Link Resolution Before File Access ('Link Following')

Published: Sep 19, 2024 | Modified: Nov 12, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat pcp-0:5.3.7-22.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat pcp-0:5.0.2-9.el8_2 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat pcp-0:5.2.5-8.el8_4 *
Red Hat Enterprise Linux 8.4 Telecommunications Update Service RedHat pcp-0:5.2.5-8.el8_4 *
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions RedHat pcp-0:5.2.5-8.el8_4 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat pcp-0:5.3.5-10.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat pcp-0:5.3.5-10.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat pcp-0:5.3.5-10.el8_6 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat pcp-0:5.3.7-19.el8_8 *
Red Hat Enterprise Linux 9 RedHat pcp-0:6.2.0-5.el9_4 *
Red Hat Enterprise Linux 9 RedHat pcp-0:6.2.2-7.el9_5 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat pcp-0:5.3.5-10.el9_0 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat pcp-0:6.0.1-8.el9_2 *
Pcp Ubuntu upstream *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References