pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
History

Fri, 22 Nov 2024 12:00:00 +0000


Wed, 09 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Nongnu
Nongnu oath Toolkit
CPEs cpe:2.3:a:nongnu:oath_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Nongnu
Nongnu oath Toolkit
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment. pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
References

Tue, 08 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment.

Sat, 05 Oct 2024 01:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title oath-toolkit: Local root exploit in a PAM module
Weaknesses CWE-22
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-09T00:00:00

Updated: 2024-10-18T03:08:08.622Z

Reserved: 2024-09-20T00:00:00

Link: CVE-2024-47191

cve-icon Vulnrichment

Updated: 2024-10-18T03:08:08.622Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-09T05:15:13.420

Modified: 2024-11-21T09:39:30.360

Link: CVE-2024-47191

cve-icon Redhat

Severity : Important

Publid Date: 2024-10-04T00:00:00Z

Links: CVE-2024-47191 - Bugzilla