configureNFS in lib/common/functions.sh in FOG through 1.5.10 allows local users to gain privileges by mounting a crafted NFS share (because of no_root_squash and insecure). In order to exploit the vulnerability, someone needs to mount an NFS share in order to add an executable file as root. In addition, the SUID bit must be added to this file.
References
Configurations
History
26 Sep 2025, 23:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://blog.hackvens.fr/advisories/CVE-2024-34477-Fogproject.html - Exploit, Third Party Advisory | |
| References | () https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability - Vendor Advisory, Exploit | |
| References | () https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/lib/common/functions.sh#L1360 - Product | |
| First Time |
Fogproject
Fogproject fogproject |
|
| CPE | cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-27 14:15
Updated : 2025-09-26 23:59
NVD link : CVE-2024-34477
Mitre link : CVE-2024-34477
CVE.ORG link : CVE-2024-34477
JSON object : View
Products Affected
fogproject
- fogproject
CWE
CWE-250
Execution with Unnecessary Privileges
