CVE-2024-3019

Updated on 28 Mar 2024

Severity

8.8 High severity

Details

CVSS score
8.8
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Overview

About vulnerability

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the ‘Metrics settings’ page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

Details

Affected product:
AlmaLinux 9.2 ESU
Affected packages:
pcp @ 6.0.1
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the ‘Metrics settings’ page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.

Fixes