CVE-2023-2319
📋 TL;DR
CVE-2023-2319 is a security regression in Red Hat Enterprise Linux 9.2 where a previously fixed Webpack vulnerability (CVE-2023-28154) was reintroduced in the PCS package. This allows potential remote code execution through the Pacemaker/Corosync Configuration System web interface. Only Red Hat Enterprise Linux 9.2 systems with the PCS package from the RHBA-2023:2151 erratum are affected.
💻 Affected Systems
- Red Hat Enterprise Linux
📦 What is this software?
Enterprise Linux High Availability by Redhat
View all CVEs affecting Enterprise Linux High Availability →
Enterprise Linux High Availability Eus by Redhat
View all CVEs affecting Enterprise Linux High Availability Eus →
Pcs by Clusterlabs
⚠️ Risk & Real-World Impact
Worst Case
Remote unauthenticated attacker gains root privileges on affected systems through the PCS web interface, leading to complete system compromise.
Likely Case
Authenticated attacker with PCS web interface access escalates privileges to execute arbitrary code with elevated permissions.
If Mitigated
Systems without PCS web interface exposed or with proper network segmentation experience minimal impact.
🎯 Exploit Status
Exploitation leverages the reintroduced CVE-2023-28154 vulnerability in Webpack. Attack path depends on PCS web interface accessibility.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: RHSA-2023:2652 erratum
Vendor Advisory: https://access.redhat.com/errata/RHSA-2023:2652
Restart Required: Yes
Instructions:
1. Update system: sudo dnf update pcs 2. Verify update: sudo dnf info pcs 3. Restart PCS services: sudo systemctl restart pcsd 4. Verify fix: Check that pcs package version includes RHSA-2023:2652
🔧 Temporary Workarounds
Disable PCS Web Interface
linuxTemporarily disable the PCS web interface to prevent exploitation while patching.
sudo systemctl stop pcsd
sudo systemctl disable pcsd
Network Restriction
linuxRestrict network access to PCS web interface using firewall rules.
sudo firewall-cmd --permanent --remove-service=high-availability
sudo firewall-cmd --reload
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks using firewall rules
- Implement strict access controls and authentication for PCS web interface
🔍 How to Verify
Check if Vulnerable:
Check if system is RHEL 9.2 and has pcs package from RHBA-2023:2151: rpm -q pcs --changelog | grep 'RHBA-2023:2151'
Check Version:
rpm -q pcs
Verify Fix Applied:
Verify pcs package includes RHSA-2023:2652 fix: rpm -q pcs --changelog | grep 'RHSA-2023:2652'
📡 Detection & Monitoring
Log Indicators:
- Unusual PCS web interface access patterns
- Unauthenticated access attempts to pcsd service
- Unexpected process execution from pcsd context
Network Indicators:
- Unusual traffic to port 2224 (default pcsd port)
- Suspicious HTTP requests to PCS web interface
SIEM Query:
source="pcsd" AND (event="authentication_failure" OR event="unauthorized_access")
🔗 References
- https://access.redhat.com/errata/RHSA-2023:2652
- https://access.redhat.com/security/cve/CVE-2023-2319
- https://bugzilla.redhat.com/show_bug.cgi?id=2190092
- https://access.redhat.com/errata/RHSA-2023:2652
- https://access.redhat.com/security/cve/CVE-2023-2319
- https://bugzilla.redhat.com/show_bug.cgi?id=2190092