Alibaba Cloud Linux 3 : 0175: fence-agents (ALINUX3-SA-2024:0175)

critical Nessus Plugin ID 236245

Synopsis

The remote Alibaba Cloud Linux host is missing one or more security updates.

Description

The remote Alibaba Cloud Linux 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALINUX3-SA-2024:0175 advisory.

Package updates are available for Alibaba Cloud Linux 3 that fix the following vulnerabilities:

CVE-2023-37920:
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes e-Tugra root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from e-Tugra from the root store.

CVE-2023-43804:
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.

CVE-2023-45803:
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs.
Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised.
This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

CVE-2023-52323:
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.

CVE-2024-22195:
Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

CVE-2024-34064:
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.

CVE-2024-37891:
urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected.
However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy- Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.

CVE-2024-6345:
A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

Tenable has extracted the preceding description block directly from the Alibaba Cloud Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://mirrors.aliyun.com/alinux/3/cve/alinux3-sa-20240175.xml

Plugin Details

Severity: Critical

ID: 236245

File Name: alinux3_sa_2024-0175.nasl

Version: 1.1

Type: local

Published: 5/14/2025

Updated: 5/14/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-37920

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Critical

Base Score: 9.3

Threat Score: 8.1

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2023-43804

Vulnerability Information

CPE: p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-intelmodular, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-brocade, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-compute, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-kubevirt, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ibm-vpc, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ilo-ssh, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-lpar, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-redfish, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-common, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-hpblade, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-eps, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ifmib, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-libvirt, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virt, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:ha-cloud-support-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-serial-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-rsa, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-sbd, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-gce, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ibm-powervs, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-tcp, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-drac5, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ipdu, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virt-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-openstack, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-cpg, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-apc, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-bladecenter, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-kdump, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:ha-cloud-support, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-kdump-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-apc-snmp, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-vmware-rest, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-vmware-soap, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-kubevirt-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-amt-ws, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-azure-arm, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-rsb, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-virsh, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-mpath, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-libvirt-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-rhevm, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-serial, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-cisco-ucs, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-heuristics-ping, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-wti, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ilo-moonshot, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ibmblade, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-cisco-mds, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-eaton-snmp, cpe:/o:alibabacloud:alibaba_cloud_linux_3, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-aliyun, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-multicast-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-scsi, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-multicast, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-all, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-emerson, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-tcp-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-virtd-cpg-debuginfo, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-aws, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ilo2, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ipmilan, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-debugsource, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:fence-agents-ilo-mp

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Alibaba/release, Host/Alibaba/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/23/2024

Vulnerability Publication Date: 7/25/2023

Reference Information

CVE: CVE-2023-37920, CVE-2023-43804, CVE-2023-45803, CVE-2023-52323, CVE-2024-22195, CVE-2024-34064, CVE-2024-37891, CVE-2024-6345