First published: Tue Sep 24 2024(Updated: )
Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API. When handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the ‘download’ or ‘data’->’download’ objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user. Two endpoints were identified which can control the object returned by a request handler sufficiently that the ’download’ object is defined and user controlled. This results in arbitrary file read. The privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Proxmox VE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21545 is considered a critical vulnerability due to the potential for authenticated attackers to download arbitrary host files.
To mitigate CVE-2024-21545, ensure that access privileges are tightly controlled and consider implementing additional validation for API responses.
CVE-2024-21545 affects users of Proxmox Virtual Environment with 'Sys.Audit' or 'VM.Monitor' privileges.
Exploiting CVE-2024-21545 allows authenticated attackers to download sensitive files from the host system via the API.
The potential impacts of CVE-2024-21545 include unauthorized access to sensitive data and possible disruption of services.