Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-24612

Опубликовано: 27 июл. 2020
Источник: redhat
CVSS3: 4

Описание

An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.

Отчет

Red Hat Enterprise Linux is not affected by this issue as it does not ship pam-u2f. In Fedora, updating the package does not trigger a relabeling of the users' pre-existing 2nd factor configuration (including root), and such may need to be manually updated, using the fixfiles onboot command, followed by a reboot (or by applying the mitigation).

Меры по смягчению последствий

To manually permit the read of the config file, the file's SELinux context can be modified : For example, for a given user '' :

chcon -R -t auth_home_t ~/.config/Yubico

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-276->CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1871217selinux-policy: SELinux prevents pam-u2f to work correctly, disabling the 2nd factor during authentication

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 5 лет назад

An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.

CVSS3: 6.7
nvd
больше 5 лет назад

An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.

CVSS3: 6.7
debian
больше 5 лет назад

An issue was discovered in the selinux-policy (aka Reference Policy) p ...

github
больше 3 лет назад

An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA.

4 Medium

CVSS3