Werk #16232: mk_oracle(ps1): Prevent privilege esclation to root
Komponente | Checks & agents | ||||||||
Titel | mk_oracle(ps1): Prevent privilege esclation to root | ||||||||
Datum | 17.01.2024 | ||||||||
Level | Grundlegende Änderung | ||||||||
Klasse | Sicherheitsfix | ||||||||
Kompatibilität | Kompatibel - benötigt kein manuelles Eingreifen | ||||||||
Checkmk versions & editions |
|
The agent plugins mk_oracle, mk_oracle.ps1 and mk_oracle_crs were vulnerable to privilege escalation to root by the oracle user.
A malicious oracle user could replace a binary (e.g. sqlplus) with another script and put it in the corresponding directory. The script would be executed by the root user.
All binaries, which are called by the plugins, are now checked if they need to be executed as a non-root (non-administrator under Windows) user, preventing the privilege escalation. Affected binaries are: sqlplus, tnsping, crsctl.
Affected Versions
- 2.3.0 (beta)
- 2.2.0
- 2.1.0
- 2.0.0 (EOL) and older
Mitigations
If updating is not possible, disable the mk_oracle plugin.
Vulnerability Management
We have rated the issue with a CVSS score of 8.2 (High) with the following CVSS vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
We have assigned CVE-2024-0638
.
Changes
All called binaries are now executed in a safe way.