Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positive in xz-util vulnerability scan (CVE-2024-3094, CVE-2022-1271) #22992

Closed
sakib789 opened this issue Apr 19, 2024 · 8 comments
Closed

Comments

@sakib789
Copy link
Member

Wazuh version Component Install type Install method Platform
4.7.3 Vulnerability Detector - - Ubuntu 20.04.6 LTS

Hi Team,

While working on this community, I've observed that the Wazuh Vulnerability scan has flagged xz-utils version 5.2.4-1 as vulnerable on Ubuntu 20.04.6 LTS, citing CVE_2022-1271 and CVE_2024-3094

image
image

However, according to both the National Vulnerability Database (NVD) and Canonical Ubuntu, the officially recognized vulnerable versions are 5.6.0 and 5.6.1.

Sources:
CVE-2024-3094
CVE-2022-1271
Ubuntu Security Advisory
image
image

My investigation suggests that versions lower than the aforementioned ones are not susceptible to these vulnerabilities.

I kindly request a thorough review of this matter.

@MiguelazoDS
Copy link
Member

Hi @sakib789,

Thank you for reporting this but I was unable to reproduce it.

image

What's the output from this query?

sqlite3 /var/ossec/queue/db/001.db 'select * from sys_programs where name like "%xz%"' --line

How did you install the xz-utils package?

It would be great if you could reproduce this behavior and share the logs you get. For that, put the line wazuh_modules.debug=2 in your /var/ossec/etc/local_internal_options.conf and restart your manager.

You will need also to remove and re-install the package so the scan triggers again.

Beyond that, you are correct and you shouldn't get that vulnerability.

@sakib789
Copy link
Member Author

sakib789 commented Apr 22, 2024

Hi @MiguelazoDS ,

Sorry for the late response due to the weekend.

I have downloaded it following this method.

wget http://archive.ubuntu.com/ubuntu/pool/main/x/xz-utils/xz-utils_5.2.4-1_amd64.deb

sudo apt install /path_to_file/xz-utils_5.2.4-1_amd64.deb

image

This is the output from the database query

image

Let me know if you need any further information.

@sakib789
Copy link
Member Author

I have just noticed the vulnerability was resolved without any changes after an hour
image

This is the command history from my OS.
image

@sakib789
Copy link
Member Author

It again triggered as a vulnerable while reinstalling. Check the screenshots as a reference.

image

image

@MiguelazoDS MiguelazoDS removed their assignment Apr 22, 2024
@MiguelazoDS
Copy link
Member

Thank you @sakib789! We should consider this case during the refactoring of the module, I'll talk to the team about this.

@sebasfalcone
Copy link
Member

CVE-2024-3094 will be solved in 4.8.0

The feed for Ubuntu is informed as:

          {
            "defaultStatus": "unaffected",
            "platforms": [
              "bionic",
              "focal",
              "jammy",
              "mantic",
              "trusty",
              "xenial"
            ],
            "product": "xz-utils",
            "vendor": "canonical"
          }

So this vulnerability won't be pressent

@sebasfalcone
Copy link
Member

CVE-2022-1271 has similar information for all vendors (except for the NVD which informs different packages)

Entry for focal:

          {
            "defaultStatus": "unaffected",
            "platforms": [
              "focal"
            ],
            "product": "xz-utils",
            "vendor": "canonical",
            "versions": [
              {
                "lessThan": "5.2.4-1ubuntu1.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }

@sebasfalcone sebasfalcone self-assigned this Apr 23, 2024
@sebasfalcone
Copy link
Member

Conclusion

This vulnerability will be correctly detected in Ubuntu systems

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

No branches or pull requests

3 participants