GHSA-C9V7-WMWJ-VF6X
Vulnerability from github – Published: 2024-01-03 21:29 – Updated: 2024-09-06 21:40Withdrawn Advisory
This advisory has been withdrawn because the vulnerability affects a binary, not a library in a supported ecosystem. Therefore, users of the library should not receive alerts. This link is maintained to preserve external references.
Original Description
Impact
An attacker that has access to nodes within the cluster may be able to SFTP to the Proxy Service. The user's permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write to them.
Patches
Fixed in versions 14.2.4, 13.4.13 and 12.4.31.
Workarounds
This issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server. To be exploitable, the user's login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.
References
- Fix PR: https://github.com/gravitational/teleport/pull/36136
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/gravitational/teleport"
},
"ranges": [
{
"events": [
{
"introduced": "14.0.0"
},
{
"fixed": "14.2.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/gravitational/teleport"
},
"ranges": [
{
"events": [
{
"introduced": "13.0.0"
},
{
"fixed": "13.4.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/gravitational/teleport"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.4.31"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2024-01-03T21:29:33Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "## Withdrawn Advisory\nThis advisory has been withdrawn because the vulnerability affects a binary, not a library in a [supported ecosystem](https://github.com/github/advisory-database#supported-ecosystems). Therefore, users of the library should not receive alerts. This link is maintained to preserve external references.\n\n## Original Description\n\n### Impact\nAn attacker that has access to nodes within the cluster may be able to SFTP to the Proxy Service. The user\u0027s permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write to them.\n\n### Patches\nFixed in versions 14.2.4, 13.4.13 and 12.4.31.\n\n### Workarounds\nThis issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server. To be exploitable, the user\u0027s login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.\n\n### References\n* Fix PR: https://github.com/gravitational/teleport/pull/36136\n",
"id": "GHSA-c9v7-wmwj-vf6x",
"modified": "2024-09-06T21:40:24Z",
"published": "2024-01-03T21:29:33Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/gravitational/teleport/security/advisories/GHSA-c9v7-wmwj-vf6x"
},
{
"type": "WEB",
"url": "https://github.com/gravitational/teleport/pull/36136"
},
{
"type": "WEB",
"url": "https://github.com/gravitational/teleport/commit/1c77fc49944ebcded32bbdd77c3e1f4f8a1c130d"
},
{
"type": "PACKAGE",
"url": "https://github.com/gravitational/teleport"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Withdrawn Advisory: SFTP is possible on the Proxy server for any user with SFTP access",
"withdrawn": "2024-01-23T12:50:08Z"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.