cve/2024/CVE-2024-32019.md
2024-06-09 00:33:16 +00:00

19 lines
1.4 KiB
Markdown

### [CVE-2024-32019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32019)
![](https://img.shields.io/static/v1?label=Product&message=netdata&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.45.0%2C%20%3C%201.45.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%3A%20Untrusted%20Search%20Path&color=brighgreen)
### Description
Netdata is an open source observability tool. In affected versions the `ndsudo` tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The `ndsudo` tool is packaged as a `root`-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the `PATH` environment variable. This allows an attacker to control where `ndsudo` looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93
- https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93
#### Github
No PoCs found on GitHub currently.