CVE-2020-25654
pacemaker: ACL restrictions bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
Se encontró un fallo de omisión de ACL en pacemaker. Un atacante que tenga una cuenta local en el clúster y en el grupo haclient podría usar la comunicación IPC con varios demonios directamente para llevar a cabo determinadas tareas que las ACL no podrían hacer si pasaran por la configuración
An ACL bypass flaw was found in Pacemaker. This flaw allows an attacker with a local account on the cluster and in the haclient group to use IPC communication with various daemons to directly perform certain tasks that would be prevented if they had gone through configured ACLs. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-16 CVE Reserved
- 2020-11-09 CVE Published
- 2023-09-30 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html | Mailing List | |
https://seclists.org/oss-sec/2020/q4/83 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1888191 | 2020-12-15 | |
https://lists.clusterlabs.org/pipermail/users/2020-October/027840.html | 2023-09-29 | |
https://security.gentoo.org/glsa/202309-09 | 2023-09-29 | |
https://access.redhat.com/security/cve/CVE-2020-25654 | 2020-12-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Clusterlabs Search vendor "Clusterlabs" | Pacemaker Search vendor "Clusterlabs" for product "Pacemaker" | < 1.1.23 Search vendor "Clusterlabs" for product "Pacemaker" and version " < 1.1.23" | - |
Affected
| ||||||
Clusterlabs Search vendor "Clusterlabs" | Pacemaker Search vendor "Clusterlabs" for product "Pacemaker" | >= 2.0.0 < 2.0.3 Search vendor "Clusterlabs" for product "Pacemaker" and version " >= 2.0.0 < 2.0.3" | - |
Affected
| ||||||
Clusterlabs Search vendor "Clusterlabs" | Pacemaker Search vendor "Clusterlabs" for product "Pacemaker" | 2.0.5 Search vendor "Clusterlabs" for product "Pacemaker" and version "2.0.5" | rc1 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|