CVE-2024-52337Improper Input Validation in Tuned

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 90.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 26

Description

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. Thi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

🔴Vulnerability Details

2
OSV
CVE-2024-52337: A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments2024-11-26
GHSA
GHSA-8c3c-gvf8-p7v2: A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments2024-11-26

📋Vendor Advisories

3
Red Hat
tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method2024-11-26
Microsoft
Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method2024-11-12
Debian
CVE-2024-52337: tuned - A log spoofing flaw was found in the Tuned package due to improper sanitization ...2024
CVE-2024-52337 — Improper Input Validation in Tuned | cvebase