Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) are vulnerable to SSRF when proxying HTTP requests between pve(pmg)proxy and pve(pmg)daemon. An attacker with an unprivileged account can craft an HTTP request to achieve SSRF and file disclosure of any files on the server. Also, in Proxmox Mail Gateway, privilege escalation to the root@pam account is possible if the backup feature has ever been used, because backup files such as pmg-backup_YYYY_MM_DD_*.tgz have 0644 permissions and contain an authkey value. This is fixed in pve-http-server 4.1-3.
References
Link | Resource |
---|---|
https://git.proxmox.com/?p=pve-http-server.git;a=commitdiff;h=c2bd69c7b5e9c775f96021cf8ae53da3dbd9029d | Patch Third Party Advisory |
https://git.proxmox.com/?p=pve-http-server.git;a=commitdiff;h=580d540ea907ba15f64379c5bb69ecf1a49a875f | Patch Third Party Advisory |
https://git.proxmox.com/?p=pve-http-server.git;a=commitdiff;h=e9df8a6e76b2a18f89295a5d92a62177bbf0f762 | Patch Third Party Advisory |
https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ | Exploit Patch Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-12-04 11:15
Updated : 2022-12-07 06:31
NVD link : CVE-2022-35508
Mitre link : CVE-2022-35508
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
proxmox
- virtual_environment
- proxmox_mail_gateway
- pve_http_server