CVE-2024-22037
Database password leaked by systemd uyuni-server-attestation service
Severity Score
5.7
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
The uyuni-server-attestation systemd service needs a database_password environment variable. This file has 640 permission, and cannot be shown users, but the environment is still exposed by systemd to non-privileged users.
El servicio systemd uyuni-server-attestation necesita una variable de entorno database_password. Este archivo tiene permiso 640 y no se puede mostrar a los usuarios, pero systemd sigue exponiendo el entorno a usuarios sin privilegios.
*Credits:
Cédric Bosdonnat of SUSE
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-01-04 CVE Reserved
- 2024-11-28 CVE Published
- 2024-11-28 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22037 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|