CVE-2024-41954

5.3 MEDIUM

📋 TL;DR

CVE-2024-41954 is an information disclosure vulnerability in FOG Project where plaintext service account credentials are stored in a world-readable configuration file. Any local user on the host can read these credentials, potentially allowing them to create unauthorized web application accounts or perform other malicious actions. This affects all FOG Project installations with versions before 1.5.10.41.

💻 Affected Systems

Products:
  • FOG Project
Versions: All versions before 1.5.10.41
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in default installations where /opt/fog/.fogsettings has world-readable permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative access to the FOG web interface, creates persistent backdoor accounts, manipulates system configurations, and potentially compromises connected client systems through the imaging/cloning functionality.

🟠

Likely Case

Local privilege escalation where a low-privileged user reads credentials and gains unauthorized access to the FOG web application, potentially modifying system settings or accessing sensitive inventory data.

🟢

If Mitigated

Limited impact if file permissions are properly restricted and network access controls prevent unauthorized connections to the FOG service.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to read the file, but the attack is trivial once file access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.10.41

Vendor Advisory: https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c

Restart Required: No

Instructions:

1. Backup current configuration. 2. Update FOG Project to version 1.5.10.41 or later using your package manager or from source. 3. Verify the .fogsettings file permissions are now restricted.

🔧 Temporary Workarounds

Restrict file permissions

linux

Change permissions on the .fogsettings file to prevent world-readable access

sudo chmod 600 /opt/fog/.fogsettings
sudo chown root:root /opt/fog/.fogsettings

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the FOG server locally
  • Monitor for unauthorized access attempts to the .fogsettings file and FOG web interface

🔍 How to Verify

Check if Vulnerable:

Check if /opt/fog/.fogsettings exists and has world-readable permissions: ls -la /opt/fog/.fogsettings

Check Version:

cat /opt/fog/version 2>/dev/null || fog --version 2>/dev/null || dpkg -l | grep fog

Verify Fix Applied:

Verify file permissions are restricted (should show -rw-------) and check FOG version is 1.5.10.41 or higher

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to FOG web interface from unexpected users
  • Unauthorized file access attempts to /opt/fog/.fogsettings

Network Indicators:

  • Unusual connections to FOG web interface from internal hosts
  • Multiple failed login attempts followed by successful logins from new accounts

SIEM Query:

source="fog.log" AND ("authentication failed" OR "new user created")

🔗 References

📤 Share & Export