7
CVSSv3

CVE-2019-3842

Published: 09/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In systemd before v242-rc4, it exists that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd 242

systemd project systemd

redhat enterprise linux 7.0

fedoraproject fedora 30

debian debian linux 8.0

Vendor Advisories

The systemd PAM module could be used to gain additional PolicyKit privileges ...
Jann Horn discovered that the PAM module in systemd insecurely uses the environment and lacks seat verification permitting spoofing an active session to PolicyKit A remote attacker with SSH access can take advantage of this issue to gain PolicyKit privileges that are normally only granted to clients in an active session on the local console For t ...
It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any" (CVE-201 ...

Exploits

As documented at <wwwfreedesktoporg/software/polkit/docs/latest/polkit8html>, for any action, a polkit policy can specify separate levels of required authentication based on whether a client is: - in an active session on a local console - in an inactive session on a local console - or neither This is expressed in the policy u ...
systemd suffers from a lack of seat verification in the PAM module and in turn permits the spoofing of an active session to polkit ...