-
Notifications
You must be signed in to change notification settings - Fork 180
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AI PRP: Request Slurm Exposed UI & API #423
Comments
@maoning Can I write a tsunami plugin for this? |
@lanced00m please reminds me once you finish the plugin implementation for #412 . |
My first PR is merged could you assign this PR to me? |
Here are the tasks for this requests before starting the implementation:
|
after a lot of research on Slurm architecture, I'm sharing what I know about this framework: |
Thank you @lanced00m for the detailed investigation. Do you know if getting the authentication key indicates immediate compromise? If so, we can trigger the detection that way (without reaching to a different host for command execution). |
OK, I will work on this, it can take time in terms of reading the wireshark logs :)) |
a secret key exists on each host that the slurm client CLI should run, so we should have this secret key which means we should have access to a slurmd cluster and it is not possible. But... I found out that the REST API authentication can be ignored by Authentication proxies according to their official example and documents! here is the reference: https://slurm.schedmd.com/rest.html#auth_proxy there is a way to disable the REST API authentication but I couldn't do it because the documentation doesn't mention this explicitly and a lot of bugs :)) happened when I changed the configuration. I should not spend my time on this part anymore because an authentication proxy can exist and we can have an easy-to-use setup to have an unauthenticated slurm REST API access. |
I just made a PR for testbeds: google/security-testbeds#59 |
@maoning, it has been over two weeks since I last wrote a plugin. Could you please accept this as soon as possible? |
@lanced00m Thanks for the detailed vuln research, you can go ahead with the plugin implementation for exposed Slurm API. |
the PR: #496 |
https://github.com/projectdiscovery/nuclei-templates/blob/f08351ccb2366033c49f23e2c07550d0e464618f/http/misconfiguration/slurm-hpc-dashboard.yaml#L4
Please verify the exposed UI via callback or other actions rather than simple regex matches.
Please read the rules of engagement first at #409.
The text was updated successfully, but these errors were encountered: