CVE-2023-32550

9.3 CRITICAL

📋 TL;DR

CVE-2023-32550 exposes sensitive system information through Landscape's server-status page, including GET requests that could enable attackers to gather intelligence for further attacks against the Landscape API. This affects systems running vulnerable versions of Landscape with the server-status page accessible. The vulnerability allows information disclosure that could facilitate subsequent exploitation.

💻 Affected Systems

Products:
  • Landscape
Versions: Versions prior to the fix
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Landscape installations with the server-status page enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive system information and API details, enabling complete system compromise through follow-up attacks on exposed API endpoints.

🟠

Likely Case

Information leakage provides attackers with reconnaissance data about system configuration, potentially leading to targeted attacks against the Landscape API.

🟢

If Mitigated

Limited information exposure with no direct path to system compromise, though some reconnaissance data may still be available.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the server-status page but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Landscape updates for specific version

Vendor Advisory: https://bugs.launchpad.net/landscape/+bug/1929037

Restart Required: Yes

Instructions:

1. Update Landscape to the latest patched version. 2. Restart Landscape services. 3. Verify the server-status page no longer exposes sensitive information.

🔧 Temporary Workarounds

Disable server-status page

linux

Prevent access to the server-status page that exposes sensitive information

# Configure Landscape to disable server-status page access
# Edit Landscape configuration to restrict /server-status endpoint

Network access control

linux

Restrict network access to Landscape server-status page

# Use firewall rules to block access to Landscape server-status port
sudo ufw deny from any to any port <landscape-port>
# Or use iptables: sudo iptables -A INPUT -p tcp --dport <landscape-port> -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Landscape systems
  • Deploy web application firewall (WAF) rules to block access to /server-status endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt to access the Landscape server-status page (typically at http://<landscape-server>/server-status) and check if sensitive system information or API details are exposed.

Check Version:

landscape-client --version or check Landscape package version via package manager

Verify Fix Applied:

After patching, verify that accessing the server-status page no longer returns sensitive information or returns an access denied/not found response.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /server-status endpoint
  • Multiple failed authentication attempts following server-status access

Network Indicators:

  • External IP addresses accessing Landscape server-status page
  • Unusual traffic patterns to Landscape API following server-status access

SIEM Query:

source="landscape" AND (url="/server-status" OR url CONTAINS "server-status")

🔗 References

📤 Share & Export