Wiz Agents & Workflows are here

CVE-2020-26273
OSQuery vulnerability analysis and mitigation

Overview

CVE-2020-26273 is a security vulnerability in osquery that allows unauthorized filesystem access through SQLite's ATTACH command. The vulnerability was discovered and disclosed in December 2020, affecting osquery versions prior to 4.6.0. The vulnerability allows users with administrative access to osquery to perform reads and writes to arbitrary SQLite databases on disk (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-77 (Command Injection) and received a Moderate severity rating. The issue stems from the improper handling of SQLite's ATTACH verb, which could be exploited to create or modify SQLite database files on the system. While the vulnerability allows for file creation, it is limited to SQLite database files and cannot overwrite existing non-SQLite files (GitHub Advisory).

Impact

The impact of this vulnerability allows attackers with administrative access to osquery to create and modify SQLite database files anywhere on the system where they have write permissions. While this does enable arbitrary SQLite database file creation, it notably cannot be used to overwrite existing non-SQLite files. This limitation somewhat constrains the potential damage, but still presents a security risk in terms of data manipulation and storage (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in osquery version 4.6.0 through the implementation of an SQLite authorizer that mitigates CVE-2020-26273. For deployments unable to update immediately, several workarounds are available: running osquery as a non-root user, using central management tools to filter for the ATTACH keyword, or implementing specific deployment configurations based on security requirements (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related OSQuery vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-1887CRITICAL9.1
  • OSQueryOSQuery
  • osquery
NoYesMar 13, 2020
CVE-2020-11081HIGH8.2
  • OSQueryOSQuery
  • osquery
NoYesJul 10, 2020
CVE-2019-3567HIGH8.1
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesJun 03, 2019
CVE-2018-6336HIGH7.8
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesDec 31, 2018
CVE-2020-26273MEDIUM5.2
  • OSQueryOSQuery
  • cpe:2.3:a:linuxfoundation:osquery
NoYesDec 16, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management