CVE-2024-36814
Linux openSUSE vulnerability analysis and mitigation

Overview

CVE-2024-36814 is an arbitrary file read vulnerability affecting AdGuard Home versions before v0.107.52. The vulnerability allows authenticated attackers to access arbitrary files as root on the system running AdGuard Home. The vulnerability was discovered by security researcher Jack Moran and was assigned a CVSS score of 7.1, indicating high severity (SecurityOnline, Happy Little Accidents).

Technical details

The vulnerability exists in AdGuard Home's custom filter list feature, which allows users to specify URLs or absolute file paths for filtering. When installed with root privileges, AdGuard Home writes its configuration to the /opt/AdGuardHome directory with -rw-r--r-- permissions, making it readable by any user. An authenticated attacker can exploit this by adding system files (like /etc/shadow) as custom filters, causing AdGuard Home to copy the contents to a world-readable location in the data/filters directory (Happy Little Accidents).

Impact

The vulnerability allows attackers to read sensitive system files, including password hashes from /etc/shadow, configuration files containing credentials, and other privileged information. This is particularly dangerous in shared environments where multiple users have access to the system running AdGuard Home (SecurityOnline).

Mitigation and workarounds

The vulnerability has been patched in AdGuard Home version v0.107.53. Users are strongly advised to update their installations immediately. System administrators should verify file permissions within /opt/AdGuardHome and restrict access to configuration files until they can apply the patch. Additionally, limiting exposure of the AdGuard Home dashboard and enforcing strong passwords can reduce the risk of exploitation (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management