CVE-2024-21545

Description

Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API. When handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the ‘download’ or ‘data’->’download’ objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user. Two endpoints were identified which can control the object returned by a request handler sufficiently that the ’download’ object is defined and user controlled. This results in arbitrary file read. The privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery.

Category

8.2
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Affected: Proxmox pve-manager
Affected: Proxmox libpve-storage-perl
Affected: Proxmox libpve-http-server-perl
Affected: Proxmox pmg-api
Affected: Proxmox libpve-common-perl (Promox VE 8)
Affected: Proxmox libpve-common-perl (Promox Mail Gateway 8)
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-21545?
CVE-2024-21545 has been scored as a high severity vulnerability.
How to fix CVE-2024-21545?
To fix CVE-2024-21545, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-21545 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-21545 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-21545?
CVE-2024-21545 affects Proxmox pve-manager, Proxmox libpve-storage-perl, Proxmox libpve-http-server-perl, Proxmox pmg-api, Proxmox libpve-common-perl (Promox VE 8), Proxmox libpve-common-perl (Promox Mail Gateway 8).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.