A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
References
Configurations
No configuration.
History
12 Nov 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
23 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration. |
23 Oct 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Oct 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-22 13:15
Updated : 2024-11-12 21:15
NVD link : CVE-2024-9050
Mitre link : CVE-2024-9050
CVE.ORG link : CVE-2024-9050
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')