发布日期:2012-12-05
更新日期:2012-12-08受影响系统:
RedHat CloudForms
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 56819
CVE(CAN) ID: CVE-2012-4574Red Hat CloudForms是本地混合云基础设施即服务(IaaS)产品,可创建和管理私有和公共云。Red Hat CloudForms的Pulp配置文件/etc/pulp/pulp.conf的权限为全局可读(world readable),而pulp.conf包含管理员账号、密码等敏感信息,导致泄露管理员密码,本地攻击者可利用此漏洞控制CloudForms部署和管理的系统。该文件可能包含的敏感信息如下:
---------------------------------------------------------------------------# default_password: default password for admin
# Highly recommend changing the default_password with "pulp-admin user update"
#
[server]
...
default_login: admin
default_password: CVkiDB/JKHhHp7+PlkfaqizG
...
oauth_key: katello
oauth_secret: zH9ZXu6JhDwlx9GjshbFaa0Q---------------------------------------------------------------------------此问题已经在下列版本内解决:
CloudForms for RHEL 6
CloudForms Tools for RHEL 5<*来源:Kurt Seifried (kurt@seifried.org)
链接:https://access.redhat.com/security/cve/CVE-2012-4574
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4574
http://secunia.com/advisories/51472/
https://www.redhat.com/support/errata/RHSA-2012-1543.html
*>建议:
--------------------------------------------------------------------------------
厂商补丁:RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2012:1543-01)以及相应补丁:RHSA-2012:1543-01:Important: CloudForms System Engine 1.1 update链接:https://www.redhat.com/support/errata/RHSA-2012-1543.htmlRed Hat CloudForms grinder /var/lib/pulp/cache/grinder文件全局可写漏洞Red Hat Certificate System "displayCRL"和"profileProcess"脚本XSS漏洞相关资讯 RedHat Linux漏洞 RedHat安全漏洞
- Red Hat Enterprise Virtualiz (02/27/2013 08:36:57)
- Red Hat OpenShift Origin (01/11/2013 08:47:50)
- Red Hat CloudForms grinder /var/ (12/08/2012 08:33:10)
| - Red Hat OpenShift Origin (01/11/2013 08:49:38)
- Red Hat Certificate System " (12/08/2012 08:34:26)
- Red Hat CloudForms全局可读(world (12/08/2012 08:32:26)
|
本文评论 查看全部评论 (0)