UBUNTU-CVE-2023-22496

Source
https://ubuntu.com/security/CVE-2023-22496
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-22496.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-22496
Related
Published
2023-01-14T01:15:00Z
Modified
2024-10-15T14:11:20Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. An attacker with the ability to establish a streaming connection can execute arbitrary commands on the targeted Netdata agent. When an alert is triggered, the function health_alarm_execute is called. This function performs different checks and then enqueues a command by calling spawn_enq_cmd. This command is populated with several arguments that are not sanitized. One of them is the registry_hostname of the node for which the alert is raised. By providing a specially crafted registry_hostname as part of the health data that is streamed to a Netdata (parent) agent, an attacker can execute arbitrary commands at the remote host as a side-effect of the raised alert. Note that the commands are executed as the user running the Netdata Agent. This user is usually named netdata. The ability to run arbitrary commands may allow an attacker to escalate privileges by escalating other vulnerabilities in the system, as that user. The problem has been fixed in: Netdata agent v1.37 (stable) and Netdata agent v1.36.0-409 (nightly). As a workaround, streaming is not enabled by default. If you have previously enabled this, it can be disabled. Limiting access to the port on the recipient Agent to trusted child connections may mitigate the impact of this vulnerability.

References

Affected packages

Ubuntu:Pro:18.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.0+dfsg-1
1.8.0+dfsg-1
1.9.0+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.16.1-2
1.19.0-3ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.29.3-4
1.31.0-4
1.33.1-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.43.2-1build2
1.44.3-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.42.1-1
1.43.1-1
1.43.2-1
1.43.2-1build1
1.43.2-1build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}