Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3429

Опубликовано: 23 мар. 2021
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

A flaw was found in cloud-init. When a system is configured through cloud-init and the "Set Passwords" module is used with "chpasswd" directive and "RANDOM", the randomly generated password for the relative user is written in clear-text in a file readable by any existing user of the system. The highest threat from this vulnerability is to data confidentiality and it may allow a local attacker to log in as another user.

Отчет

By default the randomly password generated by "chpasswd" must be changed on the first login of the user. That means that once a user accesses the system for the first time, the random password in the log file cannot be used anymore. However it is possible to configure an extended validity period for the random password, thus the actual impact of this password leak may vary based on the environment and how the systems are configured through cloud-init.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6cloud-initOut of support scope
Red Hat Enterprise Linux 7cloud-initOut of support scope
Red Hat Enterprise Linux 9cloud-initNot affected
Red Hat Enterprise Linux 8cloud-initFixedRHSA-2021:308110.08.2021
Red Hat Enterprise Linux 8.1 Extended Update Supportcloud-initFixedRHSA-2021:317717.08.2021
Red Hat Enterprise Linux 8.2 Extended Update Supportcloud-initFixedRHSA-2021:337131.08.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-532
https://bugzilla.redhat.com/show_bug.cgi?id=1940967cloud-init: randomly generated passwords logged in clear-text to world-readable file

EPSS

Процентиль: 17%
0.00054
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 2 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

CVSS3: 5.5
nvd
больше 2 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

CVSS3: 5.5
debian
больше 2 лет назад

When instructing cloud-init to set a random password for a new user ac ...

rocky
почти 4 года назад

Moderate: cloud-init security update

CVSS3: 5.5
github
больше 2 лет назад

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

EPSS

Процентиль: 17%
0.00054
Низкий

5.5 Medium

CVSS3