CVE-2020-8903
Priviged Escalation in Google Cloud Platform's Guest-OSLogin
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "adm" group, users with this role are able to read the DHCP XID from the systemd journal. Using the DHCP XID, it is then possible to set the IP address and hostname of the instance to any value, which is then stored in /etc/hosts. An attacker can then point metadata.google.internal to an arbitrary IP address and impersonate the GCE metadata server which make it is possible to instruct the OS Login PAM module to grant administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "adm" user from the OS Login entry.
Una vulnerabilidad en las versiones entre 20190304 y 20200507 de guest-oslogin de Google Cloud Platform, permite a un usuario al que solo se le otorga el rol "roles/compute.osLogin" para escalar privilegios a root. Al usar su membresía en el grupo "adm", los usuarios con este rol son capaces de leer el XID de DHCP desde el diario systemd. Con el XID de DHCP, es posible configurar la dirección IP y el nombre de host de la instancia en cualquier valor, que luego es almacenada en /etc/hosts. Un atacante puede luego apuntar a metadata.google.internal en una dirección IP arbitraria y suplantar al servidor de metadatos GCE que hace posible que el módulo PAM de inicio de sesión del Sistema Operativo otorgue privilegios administrativos. Todas las imágenes creadas después del 07 de mayo 2020 (20200507) están corregidas, y si no puede actualizar, le recomendamos editar /etc/group/security.conf y eliminar el usuario "adm" de la entrada de inicio de sesión del sistema operativo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-02-12 CVE Reserved
- 2020-06-22 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-276: Incorrect Default Permissions
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29 | 2024-05-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Guest-oslogin Search vendor "Google" for product "Guest-oslogin" | >= 20190304.00 <= 20200507.00 Search vendor "Google" for product "Guest-oslogin" and version " >= 20190304.00 <= 20200507.00" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.2 Search vendor "Opensuse" for product "Leap" and version "15.2" | - |
Affected
|