Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hj57-j5cw-2mwp

Опубликовано: 25 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Ignition config accessible to unprivileged software on VMware

Impact

Unprivileged software in VMware VMs, including software running in unprivileged containers, can retrieve an Ignition config stored in a hypervisor guestinfo variable or OVF environment. If the Ignition config contains secrets, this can result in the compromise of sensitive information.

Patches

Ignition 2.14.0 and later adds a new systemd service, ignition-delete-config.service, that deletes the Ignition config from supported hypervisors (currently VMware and VirtualBox) during the first boot. This ensures that unprivileged software cannot retrieve the Ignition config from the hypervisor.

If you have external tooling that requires the Ignition config to remain accessible in VM metadata after provisioning, and your Ignition config does not include sensitive information, you can prevent Ignition 2.14.0 and later from deleting the config by masking ignition-delete-config.service. For example:

{ "ignition": { "version": "3.0.0" }, "systemd": { "units": [ { "name": "ignition-delete-config.service", "mask": true } ] } }

Workarounds

Avoid storing secrets in Ignition configs. In addition to VMware, many cloud platforms allow unprivileged software in a VM to retrieve the Ignition config from a networked cloud metadata service. While platform-specific mitigation is possible, such as firewall rules that prevent access to the metadata service, it's best to store secrets in a dedicated platform such as Hashicorp Vault.

Advice to Linux distributions

Linux distributions that ship Ignition should ensure the new ignition-delete-config.service is installed and enabled by default.

In addition, we recommend shipping a service similar to ignition-delete-config.service that runs when existing machines are upgraded, similar to the one in https://github.com/coreos/fedora-coreos-config/pull/1738. Consider giving your users advance notice of this change, and providing instructions for masking ignition-delete-config.service on existing nodes if users have tooling that requires the Ignition config to remain accessible in VM metadata.

References

For more information, see #1300 and #1350.

For more information

If you have any questions or comments about this advisory, open an issue in Ignition or email the CoreOS development mailing list.

Пакеты

Наименование

github.com/coreos/ignition/v2

go
Затронутые версииВерсия исправления

< 2.14.0

2.14.0

Наименование

github.com/coreos/ignition

go
Затронутые версииВерсия исправления

<= 0.35.0

2.14.0

EPSS

Процентиль: 50%
0.00264
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-200
CWE-863
CWE-921

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.

CVSS3: 7.5
redhat
больше 3 лет назад

A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.

CVSS3: 6.5
nvd
около 3 лет назад

A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.

CVSS3: 6.5
debian
около 3 лет назад

A vulnerability was found in Ignition where ignition configs are acces ...

suse-cvrf
почти 3 года назад

Security update for systemd-presets-common-SUSE

EPSS

Процентиль: 50%
0.00264
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-200
CWE-863
CWE-921