发布日期:2012-12-05
更新日期:2012-12-08
受影响系统:
RedHat CloudForms
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 56819
CVE(CAN) ID: CVE-2012-4574
Red Hat CloudForms是本地混合云基础设施即服务(IaaS)产品,可创建和管理私有和公共云。
Red Hat CloudForms的Pulp配置文件/etc/pulp/pulp.conf的权限为全局可读(world readable),而pulp.conf包含管理员账号、密码等敏感信息,导致泄露管理员密码,本地攻击者可利用此漏洞控制CloudForms部署和管理的系统。
该文件可能包含的敏感信息如下:
---------------------------------------------------------------------------
# default_password: default password for admin
# Highly recommend changing the default_password with "pulp-admin user update"
#
[server]
...
default_login: admin
default_password: CVkiDB/JKHhHp7+PlkfaqizG
...
oauth_key: katello
oauth_secret: zH9ZXu6JhDwlx9GjshbFaa0Q
---------------------------------------------------------------------------
此问题已经在下列版本内解决:
CloudForms for RHEL 6
CloudForms Tools for RHEL 5
<*来源:Kurt Seifried (kurt@seifried.org)
链接:https://access.redhat.com/security/cve/CVE-2012-4574
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4574
https://www.redhat.com/support/errata/RHSA-2012-1543.html
*>
建议:
--------------------------------------------------------------------------------
厂商补丁:
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2012:1543-01)以及相应补丁:
RHSA-2012:1543-01:Important: CloudForms System Engine 1.1 update
链接:https://www.redhat.com/support/errata/RHSA-2012-1543.html