CVE-2024-33522: Calico privilege escalation vulnerability
6.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11213%
CWE
Published
4/30/2024
Updated
11/18/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/projectcalico/calico | go | < 3.26.5 | 3.26.5 |
| github.com/projectcalico/calico | go | >= 3.27.0, < 3.27.3 | 3.27.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key elements: 1) The install binary's SUID configuration allowing root execution, and 2) The control flow that executes an external binary ('calico -v') without proper validation. The main install process in install.go was vulnerable because it created directories as root and executed untrusted binaries. The fixes in PR#8517 replaced binary execution with content verification, confirming these functions were problematic. The 'copyBinary' function's role in setting permissions and handling binaries contributed to the insecure configuration.