mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
27 lines
1.8 KiB
Markdown
27 lines
1.8 KiB
Markdown
### [CVE-2024-32019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32019)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Netdata is an open source observability tool. In affected versions the `ndsudo` tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The `ndsudo` tool is packaged as a `root`-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the `PATH` environment variable. This allows an attacker to control where `ndsudo` looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93
|
|
|
|
#### Github
|
|
- https://github.com/AliElKhatteb/CVE-2024-32019-POC
|
|
- https://github.com/AzureADTrent/CVE-2024-32019-POC
|
|
- https://github.com/C0deInBlack/CVE-2024-32019-poc
|
|
- https://github.com/T1erno/CVE-2024-32019-Netdata-ndsudo-Privilege-Escalation-PoC
|
|
- https://github.com/dollarboysushil/CVE-2024-32019-Netdata-ndsudo-PATH-Vulnerability-Privilege-Escalation
|
|
- https://github.com/juanbelin/CVE-2024-32019-POC
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/sPhyos/cve-2024-32019-PoC
|
|
- https://github.com/x0da6h/POC-for-CVE-2024-32019
|
|
- https://github.com/zulloper/cve-poc
|
|
|