Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Red Hat CloudForms 全局可读(world readable)权限/etc/pulp/pulp.conf文件管理员密码泄露漏洞

发布日期:2012-12-05
更新日期:2012-12-08受影响系统:
RedHat CloudForms
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 56819
CVE(CAN) ID: CVE-2012-4574Red Hat CloudForms是本地混合云基础设施即服务(IaaS)产品,可创建和管理私有和公共云。Red Hat CloudForms的Pulp配置文件/etc/pulp/pulp.conf的权限为全局可读(world readable),而pulp.conf包含管理员账号、密码等敏感信息,导致泄露管理员密码,本地攻击者可利用此漏洞控制CloudForms部署和管理的系统。该文件可能包含的敏感信息如下:
---------------------------------------------------------------------------# default_password: default password for admin
# Highly recommend changing the default_password with "pulp-admin user update"
#
[server]
...
default_login: admin
default_password: CVkiDB/JKHhHp7+PlkfaqizG
...
oauth_key: katello
oauth_secret: zH9ZXu6JhDwlx9GjshbFaa0Q---------------------------------------------------------------------------此问题已经在下列版本内解决:
CloudForms for RHEL 6
CloudForms Tools for RHEL 5<*来源:Kurt Seifried (kurt@seifried.org)
 
  链接:https://access.redhat.com/security/cve/CVE-2012-4574
        https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4574
        http://secunia.com/advisories/51472/
        https://www.redhat.com/support/errata/RHSA-2012-1543.html
*>建议:
--------------------------------------------------------------------------------
厂商补丁:RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2012:1543-01)以及相应补丁:RHSA-2012:1543-01:Important: CloudForms System Engine 1.1 update链接:https://www.redhat.com/support/errata/RHSA-2012-1543.htmlRed Hat CloudForms grinder /var/lib/pulp/cache/grinder文件全局可写漏洞Red Hat Certificate System "displayCRL"和"profileProcess"脚本XSS漏洞相关资讯      RedHat Linux漏洞  RedHat安全漏洞 
  • Red Hat Enterprise Virtualiz  (02/27/2013 08:36:57)
  • Red Hat OpenShift Origin   (01/11/2013 08:47:50)
  • Red Hat CloudForms grinder /var/  (12/08/2012 08:33:10)
  • Red Hat OpenShift Origin   (01/11/2013 08:49:38)
  • Red Hat Certificate System "  (12/08/2012 08:34:26)
  • Red Hat CloudForms全局可读(world  (12/08/2012 08:32:26)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明