Arbitrary Code Injection Affecting NetworkManager-libreswan package, versions <0:1.2.22-4.el9_5


Severity

Recommended
high

Based on AlmaLinux security rating

    Threat Intelligence

    EPSS
    0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ALMALINUX9-NETWORKMANAGERLIBRESWAN-8400191
  • published 20 Nov 2024
  • disclosed 23 Oct 2024

How to fix?

Upgrade AlmaLinux:9 NetworkManager-libreswan to version 0:1.2.22-4.el9_5 or higher.
This issue was patched in ALSA-2024:9555.

NVD Description

Note: Versions mentioned in the description apply only to the upstream NetworkManager-libreswan package and not the NetworkManager-libreswan package as distributed by AlmaLinux. See How to fix? for AlmaLinux:9 relevant fixed versions and status.

A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the leftupdownkey. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.

CVSS Scores

version 3.1
Expand this section

Red Hat

7.8 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High