CVE-2024-3019

CVSS V2 None CVSS V3 None
Description
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
Overview
  • CVE ID
  • CVE-2024-3019
  • Assigner
  • redhat
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-03-28T18:32:43.298Z
  • Last Modified Date
  • 2024-06-04T17:32:49.182Z
References
Reference URL Reference Tags
https://access.redhat.com/errata/RHSA-2024:2566 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3264 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3321 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3322 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3323 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3324 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3325 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3392 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-3019 vdb-entry x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2271898 issue-tracking x_refsource_REDHAT
History
Created Old Value New Value Data Type Notes
2024-06-23 22:46:36 Added to TrackCVE