SB2025021417 - Multiple vulnerabilities in Service Interconnect
Published: February 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2024-9287)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation in the venv module when creating a virtual environment. A local user can pass specially crafted strings to the application and execute arbitrary OS commands on the target system.
2) Input validation error (CVE-ID: CVE-2024-11168)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient validation of bracketed hosts (e.g. []) within the urllib.parse.urlsplit() and urlparse() functions allowing hosts that weren't IPv6 or IPvFuture. A remote attacker can pass specially crafted IP address to the application to bypass implemented IP-based security checks or perform SSRF attacks.
3) Unprotected storage of credentials (CVE-ID: CVE-2024-12582)
The vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to application stored credentials in either a Kubernetes secret or a podman volume in a plaintext file when the default authentication method is used. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration. Additionally, a user may induce skupper into reading extremely large files into memory, resulting in resource exhaustion and a denial of service attack.
Remediation
Install update from vendor's website.