CVE-2023-3899

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
References
Link Resource
https://access.redhat.com/errata/RHSA-2023:4701 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4702 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4703 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4704 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4705 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4706 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4707 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4708 Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-3899 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2225407 Issue Tracking Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4701 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4702 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4703 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4704 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4705 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4706 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4707 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4708 Vendor Advisory
https://access.redhat.com/security/cve/CVE-2023-3899 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2225407 Issue Tracking Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:subscription-manager:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:subscription-manager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/ -
References () https://access.redhat.com/errata/RHSA-2023:4701 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4701 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4702 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4702 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4703 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4703 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4704 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4704 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4705 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4705 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4706 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4706 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4707 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4707 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4708 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4708 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-3899 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-3899 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2225407 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2225407 - Issue Tracking, Vendor Advisory

16 Sep 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-23 11:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-3899

Mitre link : CVE-2023-3899

CVE.ORG link : CVE-2023-3899


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_power_big_endian
  • enterprise_linux_server_aus
  • enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
  • enterprise_linux_server_tus
  • enterprise_linux_server_update_services_for_sap_solutions
  • enterprise_linux_for_scientific_computing
  • enterprise_linux_for_ibm_z_systems_eus
  • enterprise_linux
  • enterprise_linux_for_ibm_z_systems
  • enterprise_linux_workstation
  • enterprise_linux_for_power_little_endian_eus
  • enterprise_linux_for_arm_64
  • enterprise_linux_server
  • subscription-manager
  • enterprise_linux_eus
  • enterprise_linux_update_services_for_sap_solutions
  • enterprise_linux_for_arm_64_eus
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_desktop

fedoraproject

  • fedora
CWE
CWE-285

Improper Authorization

CWE-863

Incorrect Authorization