Bug 1198195 (CVE-2022-26110) - VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command injection
Summary: VUL-0: CVE-2022-26110: htcondor: mishandled privileges allow possible command...
Status: RESOLVED FIXED
Alias: CVE-2022-26110
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.4
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Christian Goll
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/328131/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-04-07 11:43 UTC by Cathy Hu
Modified: 2024-03-28 14:06 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2022-04-07 11:43:57 UTC
rh#2072029

An attacker need only have READ-level authorization to a vulnerable daemon using the CLAIMTOBE authentication method. This means they are able to run tools like condor_q or condor_status. Many pools do not restrict who can issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in the default configuration. Thus, it is likely that an attacker could execute this command remotely from an untrusted network, unless prevented by a firewall or other network-level access controls. 

Reference:

https://htcondor.org/security/vulnerabilities/HTCONDOR-2022-0003

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2072029
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
http://www.cvedetails.com/cve/CVE-2022-26110/
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2022-0003/
Comment 1 Cathy Hu 2022-04-07 11:44:28 UTC
Affected:
- openSUSE:Factory/htcondor
Comment 2 Christian Goll 2024-03-28 14:06:02 UTC
htcondor was removed from factory