Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5fqv-mpj8-h7gm

Опубликовано: 01 мар. 2023
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Lemur subject to insecure random generation

Overview

Lemur was using insecure random generation for its example configuration file, as well as for some utilities.

Impact

The potentially affected generated items include:

Configuration itemConfig option name (if applicable)Documentation link (if applicable)Rotation optionCode reference(s)
Flask session secretSECRET_KEYFlask documentationGenerate a new secret and place in config; all existing sessions will be invalidatedN/A, internal to Flask
Lemur token secretLEMUR_TOKEN_SECRETLemur's configuration documentationGenerate a new secret and place in config; all existing JWTs will be invalidated and must be regenerated (including API keys)1, 2
Lemur database encryption keyLEMUR_ENCRYPTION_KEYSLemur's configuration documentationA new key can be generated and added to this list, but existing data encrypted with prior keys cannot be re-encrypted unless you write a custom re-encryption process1
OAuth2 state token secret keyOAUTH_STATE_TOKEN_SECRETLemur's configuration documentationGenerate a new secret and place in config1
Randomly generated passphrases for openssl keystoresN/A, generated at runtime but persistedN/ARe-export all openssl keystores and replace them wherever they're in use1
Initial password for LDAP usersN/A, generated at runtime but persistedN/AN/A, cannot be rotated*1
Initial password for Ping/OAuth2 usersN/A, generated at runtime but persistedN/AN/A, cannot be rotated*1
Oauth2 nonceN/A, short-lived runtime secretN/AN/A, rotation is not required (these are short-lived)1
Verisign certificate enrollment challengesN/A, short-lived runtime secretN/AN/A, rotation is not required (these are short-lived)1

If your deployment of Lemur is using any of the above config secrets that were generated by Lemur's example config (i.e., generated using insecure randomness), you should rotate those config secrets. If you generated your config secrets in a more secure way, they are not known to be compromised, but you should still upgrade Lemur to ensure that you receive code fixes for the runtime-generated secrets.

For general information and guidance on Lemur secret configuration, see Lemur's configuration documentation, which includes information on many of the configuration options listed above.

*For the user passwords: Even though these users are configured to use SSO, they do get generated with valid database passwords that can be used to log in. Since Lemur doesn't have an option to change passwords (#3888), one option for rotating them would be to directly modify the value in the database to some other unguessable string (you do not need to know the plaintext password since it won't be used).

Patches

The patch is available in v1.3.2.

Workarounds

No workarounds are available.

References

N/A

Пакеты

Наименование

lemur

pip
Затронутые версииВерсия исправления

< 1.3.2

1.3.2

EPSS

Процентиль: 47%
0.00239
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 7.5
nvd
почти 3 года назад

Netflix Lemur before version 1.3.2 used insufficiently random values when generating default credentials. The insufficiently random values may allow an attacker to guess the credentials and gain access to resources managed by Lemur.

EPSS

Процентиль: 47%
0.00239
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-330