GHSA-C9V7-WMWJ-VF6X

Vulnerability from github – Published: 2024-01-03 21:29 – Updated: 2024-09-06 21:40
VLAI?
Summary
Withdrawn Advisory: SFTP is possible on the Proxy server for any user with SFTP access
Details

Withdrawn Advisory

This advisory has been withdrawn because the vulnerability affects a binary, not a library in a supported ecosystem. Therefore, users of the library should not receive alerts. This link is maintained to preserve external references.

Original Description

Impact

An attacker that has access to nodes within the cluster may be able to SFTP to the Proxy Service. The user's permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write to them.

Patches

Fixed in versions 14.2.4, 13.4.13 and 12.4.31.

Workarounds

This issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server. To be exploitable, the user's login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.

References

  • Fix PR: https://github.com/gravitational/teleport/pull/36136
Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "Go",
        "name": "github.com/gravitational/teleport"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "14.0.0"
            },
            {
              "fixed": "14.2.4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Go",
        "name": "github.com/gravitational/teleport"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "13.0.0"
            },
            {
              "fixed": "13.4.13"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Go",
        "name": "github.com/gravitational/teleport"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "12.4.31"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-03T21:29:33Z",
    "nvd_published_at": null,
    "severity": "HIGH"
  },
  "details": "## Withdrawn Advisory\nThis advisory has been withdrawn because the vulnerability affects a binary, not a library in a [supported ecosystem](https://github.com/github/advisory-database#supported-ecosystems). Therefore, users of the library should not receive alerts. This link is maintained to preserve external references.\n\n## Original Description\n\n### Impact\nAn attacker that has access to nodes within the cluster may be able to SFTP to the Proxy Service. The user\u0027s permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write to them.\n\n### Patches\nFixed in versions 14.2.4, 13.4.13 and 12.4.31.\n\n### Workarounds\nThis issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server. To be exploitable, the user\u0027s login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.\n\n### References\n* Fix PR: https://github.com/gravitational/teleport/pull/36136\n",
  "id": "GHSA-c9v7-wmwj-vf6x",
  "modified": "2024-09-06T21:40:24Z",
  "published": "2024-01-03T21:29:33Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/gravitational/teleport/security/advisories/GHSA-c9v7-wmwj-vf6x"
    },
    {
      "type": "WEB",
      "url": "https://github.com/gravitational/teleport/pull/36136"
    },
    {
      "type": "WEB",
      "url": "https://github.com/gravitational/teleport/commit/1c77fc49944ebcded32bbdd77c3e1f4f8a1c130d"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/gravitational/teleport"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [],
  "summary": "Withdrawn Advisory: SFTP is possible on the Proxy server for any user with SFTP access",
  "withdrawn": "2024-01-23T12:50:08Z"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…