Werk #16198: mk_informix: Do not allow privilege escalation
Component | Checks & agents | ||||||||
Title | mk_informix: Do not allow privilege escalation | ||||||||
Date | Mar 8, 2024 | ||||||||
Level | Trivial Change | ||||||||
Class | Security Fix | ||||||||
Compatibility | Compatible - no manual interaction needed | ||||||||
Checkmk versions & editions |
|
The informix database monitoring plugin would previously eval
statements parsed from $INFORMIXDIR/bin/onstat
. Since the plugin is usually run as root, this could cause statements injected in $INFORMIXDIR/bin/onstat
to be run as root as well.
By adding scripts named the same as other functionality found in $PATH
to $INFORMIXDIR/bin
, $PATH
functionality could also be overshadowed and the custom executed as root.
Finally, $INFORMIXDIR/bin/onstat
would be executed as root, allowing a substituted script to be run with elevated privileges.
With this werk, the environment variables will be exported instead and $PATH
will now be searched before $INFORMIXDIR/bin
.
The plugin will now also check if $INFORMIXDIR/bin/onstat
belongs to root if the plugin is executed as root. If not, it will be executed as the user owning the executable.
This issue was found during internal review.
Affected Versions:
- 2.3.0 (beta)
- 2.2.0
- 2.1.0
- 2.0.0 (EOL)
Vulnerability Management:
We have rated the issue with a CVSS Score of 8.8 (High) with the following CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
and assigned CVE CVE-2024-28824
.