[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2024-3019Date: (C)2024-03-29   (M)2024-06-10


A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score :
Exploit Score: Exploit Score:
Impact Score: Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector:
Attack Complexity: Access Complexity:
Privileges Required: Authentication:
User Interaction: Confidentiality:
Scope: Integrity:
Confidentiality: Availability:
Integrity:  
Availability:  
  
Reference:
RHBZ#2271898
RHSA-2024:2566
RHSA-2024:3264
RHSA-2024:3321
RHSA-2024:3322
RHSA-2024:3323
RHSA-2024:3324
RHSA-2024:3325
RHSA-2024:3392
https://access.redhat.com/security/cve/CVE-2024-3019

CWE    1
CWE-668
OVAL    7
oval:org.secpod.oval:def:2600596
oval:org.secpod.oval:def:509226
oval:org.secpod.oval:def:5800230
oval:org.secpod.oval:def:1507516
...
XCCDF    1

© SecPod Technologies