Hello,

First, if you, or anybody else, think they found a problem with security 
implications
then please use our dedicated confidential channels for evaluating that 
initially:

https://pve.proxmox.com/wiki/Security_Reporting

If it's a real problem then other users might not be happy about a public 
broadcast
for all potential attackers to read and basically act as how-to.

Am 27.11.24 um 01:14 schrieb James Brown:
> I suspect a security flaw within ESXi VM import. If a malicious actor forges a
> VMWare VM config with root paths such as /var/log/auth.log, could lead to 
> potential
> data leak if the import task is executed.

The core assumption is that the admin doing the import fully controls both 
sides,
VMWare ESXi and Proxmox VE.
As otherwise this feature makes no sense, if the ESXi isn't trusted, it can do 
all
sorts of bad things that just cannot be protected against, like e.g., inject 
some
rootkits into the VM data stream at any time. And yes, it might also leak some
data from the PVE host.

For OVA imports we hedge against that by disallowing disks with 
additional/external
references. For ESXi we do not do so because 1) it's more common there to have 
legit
references in the disks (which are not trivial to tell apart from bad ones) and 
2)
because compared to allowing third-party/not fully trusted users uploading 
images
allowing one to add an ESXi storage and then import from there is IMO a rather
non-existent use case, and that would also mean that ESXi and Proxmox VE are 
either
in the same LAN or tunneled, as otherwise they should be shielded off from 
public
access already anyway.

But do you have an actual use case we missed and would break our assumptions 
here?
What we might do is documenting this more explicitly, possibly even showing a 
hint
in the UI.

- Thomas


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to