CVE-2024-45044

8.8 HIGH

📋 TL;DR

This vulnerability in Bareos allows users to bypass command access controls by using command abbreviations. When negative ACLs are configured to forbid specific commands, users can still execute those commands by using their abbreviated forms. This affects Bareos installations using command ACLs with negative permissions.

💻 Affected Systems

Products:
  • Bareos
Versions: Versions before 23.0.4, 22.1.6, and 21.1.11
Operating Systems: All platforms running Bareos
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using command ACLs with negative permissions (deny rules). Positive-only ACL configurations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could execute restricted administrative commands, potentially compromising backup integrity, accessing sensitive data, or disrupting backup operations.

🟠

Likely Case

Users with limited privileges could execute commands they're explicitly forbidden from using, violating the principle of least privilege and potentially accessing backup metadata or configuration information.

🟢

If Mitigated

If only positive ACLs are used (allow lists) without any negative permissions, the vulnerability does not apply and there is no impact.

🌐 Internet-Facing: MEDIUM - Bareos consoles are typically internal, but if exposed, this could allow unauthorized command execution.
🏢 Internal Only: HIGH - This affects internal access control mechanisms and could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to bconsole and knowledge of command abbreviations. The vulnerability is straightforward to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.0.4, 22.1.6, or 21.1.11

Vendor Advisory: https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8

Restart Required: Yes

Instructions:

1. Identify your Bareos version. 2. Upgrade to the appropriate patched version (23.0.4 for 23.x, 22.1.6 for 22.x, 21.1.11 for 21.x). 3. Restart Bareos services. 4. Verify ACL enforcement works correctly with command abbreviations.

🔧 Temporary Workarounds

Convert to positive-only ACLs

all

Replace negative ACLs (deny rules) with positive-only ACLs (allow lists) to eliminate the vulnerability

# Edit Bareos configuration files to remove negative ACL entries
# Replace '!command = whoami' with explicit allow lists for permitted commands

Disable command abbreviations

all

Configure bconsole to require full command names instead of accepting abbreviations

# Add 'AutoComplete = no' to bconsole configuration
# Or configure specific command completion restrictions

🧯 If You Can't Patch

  • Audit all command ACL configurations and convert negative ACLs to positive-only allow lists
  • Implement additional monitoring for command execution patterns and alert on use of restricted command abbreviations

🔍 How to Verify

Check if Vulnerable:

Test if command abbreviations bypass ACL restrictions: 1. Configure a negative ACL for a command like 'whoami'. 2. Attempt to execute 'w' or 'who' in bconsole. 3. If the command executes despite the ACL, the system is vulnerable.

Check Version:

bareos-fd -v 2>&1 | grep Version  # For Bareos File Daemon
bareos-sd -v 2>&1 | grep Version  # For Bareos Storage Daemon
bareos-dir -v 2>&1 | grep Version  # For Bareos Director

Verify Fix Applied:

After patching, repeat the vulnerable test: 1. Configure negative ACL for a command. 2. Attempt to use abbreviations. 3. Verify abbreviations are now properly blocked by ACL checks.

📡 Detection & Monitoring

Log Indicators:

  • Failed ACL checks for abbreviated commands
  • Successful execution of commands that should be blocked by ACLs
  • Unusual command abbreviation patterns in bconsole logs

Network Indicators:

  • bconsole connections followed by unexpected command execution patterns

SIEM Query:

source="bareos*" AND ("ACL denied" OR "command not permitted") AND ("w" OR "who" OR other_abbreviations)

🔗 References

📤 Share & Export