Bug 1198195 - (CVE-2022-26110) VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command injection
(CVE-2022-26110)
VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command...
Status: NEW
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.4
Other Other
: P3 - Medium : Normal (vote)
: ---
Assigned To: Christian Goll
Security Team bot
https://smash.suse.de/issue/328131/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-04-07 11:43 UTC by Hu
Modified: 2022-04-07 12:15 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-04-07 11:43:57 UTC
rh#2072029

An attacker need only have READ-level authorization to a vulnerable daemon using the CLAIMTOBE authentication method. This means they are able to run tools like condor_q or condor_status. Many pools do not restrict who can issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in the default configuration. Thus, it is likely that an attacker could execute this command remotely from an untrusted network, unless prevented by a firewall or other network-level access controls. 

Reference:

https://htcondor.org/security/vulnerabilities/HTCONDOR-2022-0003

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2072029
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
http://www.cvedetails.com/cve/CVE-2022-26110/
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2022-0003/
Comment 1 Hu 2022-04-07 11:44:28 UTC
Affected:
- openSUSE:Factory/htcondor