Описание
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Отчет
In Red Hat Identity Management, this flaw affects only new installation made using Red Hat Enterprise Linux 8.4. This issue is considered important in IdM, as its installation is done in Debug mode. The leaked credentials would allow any user with Low privileges to have full control of the managed domain(s).
In Red Hat Certificate System, this flaw affects only new installation of RHCS 10.2, when pkispawn
is started in Debug mode. This issue is considered with Low severity as this is not the default, and Certificate System should be isolated from regular users.
Existing installation are not affected.
Меры по смягчению последствий
Manually delete or restrict permission to other
in the installation log file :
$ rm /var/log/pki/pki-ca-spawn*
- OR, if you need to keep the installation logs : $ chmod o-rwx /var/log/pki/pki-ca-spawn*
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Certificate System 10 | pki-core | Affected | ||
Red Hat Enterprise Linux 6 | pki-core | Not affected | ||
Red Hat Enterprise Linux 7 | pki-core | Not affected | ||
Red Hat Enterprise Linux 9 | pki-core | Not affected | ||
Red Hat Enterprise Linux 8 | pki-core | Fixed | RHSA-2021:2235 | 03.06.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
A flaw was found in the PKI-server, where the spkispawn command, when ...
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
EPSS
7.8 High
CVSS3