Skip to main content
Delphix

TB122 Command Injection Vulnerability in the Continuous Data and Continuous Compliance Engines - CVE-2024-6726

 

 

Alert Type

Security

Impact

Severity (NVD): High 

Delphix CVSS v3.1 Score:  8.8 

Delphix CVSS v3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 

Attack Vector – Network 
Attack Complexity – Low 
Privileges Required – Low 
User Interaction – None 
Scope – Unchanged 
Confidentiality – High 
Integrity – High 
Availability – High 

An authenticated user with the “Provisioner” or “Owner” role on a dataset group can inject specially crafted commands into the “sourceConfig.path” parameter of the “database/createEmpty” API for the Delphix Continuous Data or Continous Compliance Engine. These commands are executed as root, resulting in a privilege escalation.

Affected Products and Versions 

Continuous Data (formerly Virtualization) 

Continuous Data has a variety of functional deployments. Depending on the deployment you’re using, the impact may differ.

Configuration

Affected

Continuous Data

Yes

Cloud Engine

Yes

Continuous Vault

Yes

Self Service (Jet Stream) No

All supported releases prior to 24.0.0.0 (including 24.0.0.0) 

Continuous Compliance (formerly Masking) 

All supported releases prior to 24.0.0.0 (including 24.0.0.0)

Containerized Masking

N/A

Hyperscale Compliance 

N/A

Data Control Tower 

N/A

Delphix Compliance Services 

N/A

Mitigation 

Upgrade to a version of the product that does not contain this vulnerability.

Resolution 

Resolved in DevOps Data Platform version 25.0.0.0 and later releases for the Continuous Data Engines and Continuous Compliance Engines. 

Additional Information