目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-9050 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Networkmanager-libreswan: local privilege escalation via leftupdown
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
对生成代码的控制不恰当(代码注入)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
NetworkManager 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
NetworkManager是一款网络管理守护程序。 NetworkManager存在安全漏洞,该漏洞源于NetworkManager 的 libreswan 客户端插件中发现了一个缺陷,它无法正确地清理本地非特权用户的 VPN 配置。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Red HatRed Hat Enterprise Linux 7.7 Advanced Update Support 0:1.2.4-4.el7_7 ~ * cpe:/o:redhat:rhel_aus:7.7::server
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:1.2.4-4.el7_9 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 0:1.2.10-7.el8_10 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 0:1.2.10-6.el8_2 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:1.2.10-6.el8_4 ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Telecommunications Update Service 0:1.2.10-6.el8_4 ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Update Services for SAP Solutions 0:1.2.10-6.el8_4 ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:1.2.10-6.el8_6 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 0:1.2.10-6.el8_6 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:1.2.10-6.el8_6 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 0:1.2.10-6.el8_8 ~ * cpe:/a:redhat:rhel_eus:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:1.2.22-4.el9_5 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:1.2.14-3.el9_0 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 0:1.2.14-6.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:1.2.18-6.el9_4 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
二、漏洞 CVE-2024-9050 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-9050 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-9050

暂无评论


发表评论