Bugzilla – Bug 1198195
VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command injection
Last modified: 2022-04-07 12:15:01 UTC
rh#2072029 An attacker need only have READ-level authorization to a vulnerable daemon using the CLAIMTOBE authentication method. This means they are able to run tools like condor_q or condor_status. Many pools do not restrict who can issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in the default configuration. Thus, it is likely that an attacker could execute this command remotely from an untrusted network, unless prevented by a firewall or other network-level access controls. Reference: https://htcondor.org/security/vulnerabilities/HTCONDOR-2022-0003 References: https://bugzilla.redhat.com/show_bug.cgi?id=2072029 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26110 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110 http://www.cvedetails.com/cve/CVE-2022-26110/ https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2022-0003/
Affected: - openSUSE:Factory/htcondor