DIRAC: Unauthorized users can read proxy contents during generation
CVE-2024-29905

8.1HIGH

Key Information:

Vendor

Diracgrid

Status
Vendor
CVE Published:
9 April 2024

What is CVE-2024-29905?

The DIRAC software framework for distributed computing contains a vulnerability in the proxy generation process. Prior to version 8.0.41, unauthorized users on the same machine could gain temporary read access to the proxy during the generation process triggered by the dirac-proxy-init command. This vulnerability presents risks as an unauthorized user could execute any action permissible with the original proxy. Despite the brief exposure time, it is significant for security. To mitigate the risk, users are encouraged to set the X509_USER_PROXY environment variable to a directory path readable only by themselves. After generating the file, it can be securely moved to the standard location, reducing vulnerability chances.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

DIRAC < 8.0.41

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.