Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3551

Опубликовано: 03 июн. 2021
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

Отчет

In Red Hat Identity Management, this flaw affects only new installation made using Red Hat Enterprise Linux 8.4. This issue is considered important in IdM, as its installation is done in Debug mode. The leaked credentials would allow any user with Low privileges to have full control of the managed domain(s). In Red Hat Certificate System, this flaw affects only new installation of RHCS 10.2, when pkispawn is started in Debug mode. This issue is considered with Low severity as this is not the default, and Certificate System should be isolated from regular users. Existing installation are not affected.

Меры по смягчению последствий

Manually delete or restrict permission to other in the installation log file : $ rm /var/log/pki/pki-ca-spawn*

  • OR, if you need to keep the installation logs : $ chmod o-rwx /var/log/pki/pki-ca-spawn*

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certificate System 10pki-coreAffected
Red Hat Enterprise Linux 6pki-coreNot affected
Red Hat Enterprise Linux 7pki-coreNot affected
Red Hat Enterprise Linux 9pki-coreNot affected
Red Hat Enterprise Linux 8pki-coreFixedRHSA-2021:223503.06.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-312
https://bugzilla.redhat.com/show_bug.cgi?id=1959971pki-server: Dogtag installer "pkispawn" logs admin credentials into a world-readable log file

EPSS

Процентиль: 3%
0.00018
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.8
nvd
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.8
debian
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when ...

rocky
почти 4 года назад

Important: pki-core:10.6 security update

github
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

EPSS

Процентиль: 3%
0.00018
Низкий

7.8 High

CVSS3