Bug 1222121 (CVE-2024-3019) - VUL-0: CVE-2024-3019: pcp: exposure of the redis server backend allows remote command execution via pmproxy
Summary: VUL-0: CVE-2024-3019: pcp: exposure of the redis server backend allows remote...
Status: IN_PROGRESS
Alias: CVE-2024-3019
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/399281/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-3019:8.8:(AV:A...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-28 11:15 UTC by SMASH SMASH
Modified: 2024-07-17 10:24 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
camila.matos: needinfo? (martin.schreiner)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-28 11:15:01 UTC
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user.

This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface.

This issue affects PCP versions 4.3.4 and newer.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-3019
https://bugzilla.redhat.com/show_bug.cgi?id=2271898
Comment 1 Carlos López 2024-03-28 11:22:25 UTC
This affects:
 - SUSE:SLE-15-SP3:Update/pcp        5.2.2
 - SUSE:SLE-15-SP4:Update/pcp        5.2.5
 - SUSE:SLE-15-SP6:GA/pcp            5.3.7
 - SUSE:ALP:Source:Standard:1.0/pcp  5.3.7
 - openSUSE:Factory/pcp              5.3.7

The fix is:
https://github.com/performancecopilot/pcp/commit/3bde240a2acc85e63e2f7813330713dd9b59386e
Comment 2 Martin Schreiner 2024-03-28 13:57:47 UTC
On it!
Comment 3 Martin Schreiner 2024-04-03 14:53:38 UTC
Fix submitted to the devel project:
https://build.opensuse.org/request/show/1164379
Comment 4 Martin Schreiner 2024-04-08 15:01:51 UTC
Request for SUSE:SLE-15-SP4:Update/pcp:
https://build.suse.de/request/show/325726
Comment 5 Martin Schreiner 2024-04-08 15:07:22 UTC
I've merged the request to the devel project myself, after 5 days without reviews.
This fix has since been submitted to openSUSE:Factory as part of the 6.2.0 upgrade:
https://build.opensuse.org/request/show/1166221
Comment 6 Martin Schreiner 2024-04-08 15:30:22 UTC
Request for SUSE:SLE-15-SP3:Update/pcp:
https://build.suse.de/request/show/325728
Comment 7 Martin Schreiner 2024-04-08 15:32:19 UTC
SUSE:SLE-15-SP6:GA/pcp has been frozen, so I think we'll have to wait for SUSE:SLE-15-SP6:Update until it starts accepting requests.

ALP will be submitted as soon as the request for openSUSE:Factory has been accepted.
Comment 8 Maintenance Automation 2024-04-17 12:30:04 UTC
SUSE-RU-2024:1327-1: An update that has one fix can now be installed.

Category: recommended (important)
Bug References: 1222121
Maintenance Incident: [SUSE:Maintenance:33306](https://smelt.suse.de/incident/33306/)
Sources used:
openSUSE Leap 15.4 (src):
 pcp-5.2.5-150400.5.6.3
openSUSE Leap 15.5 (src):
 pcp-5.2.5-150400.5.6.3
Development Tools Module 15-SP5 (src):
 pcp-5.2.5-150400.5.6.3
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 pcp-5.2.5-150400.5.6.3
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 pcp-5.2.5-150400.5.6.3
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 pcp-5.2.5-150400.5.6.3
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 pcp-5.2.5-150400.5.6.3
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 pcp-5.2.5-150400.5.6.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Martin Schreiner 2024-05-29 21:51:55 UTC
This bug will be fix as part of these SRs, which also solve bsc#1217826.
The 6.2.0 version upgrade contains the patch required to solve this problem, named disable-redis-proxying-by-default.patch.
As soon as that bug is fixed, so is this one.

https://build.suse.de/request/show/331400 SLE-15-SP1 / pcp
https://build.suse.de/request/show/331401 SLE-15-SP3 / pcp
https://build.suse.de/request/show/331402 SLE-15-SP4 / pcp
https://build.suse.de/request/show/331460 SLE-15 / pcp
https://build.suse.de/request/show/331657 SLE-12 / pcp
Comment 13 Martin Schreiner 2024-06-28 00:43:06 UTC
I'm reassigning this bug to security, as the appropriate SRs have already been submitted.

Feel free to reassign to me if need be, or get in touch directly.