Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2905

Опубликовано: 09 апр. 2024
Источник: redhat
CVSS3: 6.2
EPSS Низкий

Описание

A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.

Отчет

This vulnerability lets local, unconfined applications read the hashed password for all users of the system from those files. To gain further access to the system, those hashed passwords need to be brute-forced to discover the real passwords that may be used to authenticate as a more privileged user on the system, for example over SSH. On systems with SELinux enabled and in enforcing mode, access to those files is limited to unconfined (usually interactive) users, unconfined systemd services and privileged containers. Confined daemons, users and containers are not able to access them. Only OpenShift clusters installed on OCP version 4.14 and later are affected. OpenShift Clusters installed on previous OCP releases or updated to 4.14 and later are not affected, because /etc/shadow is usually “locally modified” and the local version remains. Clusters with no passwords set for any users (i.e. only SSH keys were used; the OpenShift default) are not impacted by this vulnerability even though it is present on the node.

Меры по смягчению последствий

If you need to apply the fix immediately, you can run the following commands, using credentials that have administrator access to an OpenShift cluster:

List current permissions for all nodes

for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node -- bash -c "ls -alhZ /host/etc/shadow"; done

Set correct permissions

for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node -- chmod --verbose 0000 /host/etc/shadow /host/etc/gshadow /host/etc/shadow- /host/etc/gshadow-; done As a precaution, we recommend rotating all user credentials stored in those files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8rpm-ostreeNot affected
Red Hat OpenShift Container Platform 4rpm-ostreeNot affected
Red Hat Enterprise Linux 10rpm-ostreeFixedRHBA-2025:487213.05.2025
Red Hat Enterprise Linux 9rpm-ostreeFixedRHSA-2024:382311.06.2024
Red Hat Enterprise Linux 9.2 Extended Update Supportrpm-ostreeFixedRHSA-2024:340128.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=2271585rpm-ostree: world-readable /etc/shadow file

EPSS

Процентиль: 2%
0.00017
Низкий

6.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.2
nvd
больше 1 года назад

A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.

CVSS3: 6.2
msrc
2 месяца назад

Описание отсутствует

oracle-oval
около 1 года назад

ELSA-2024-3823: rpm-ostree security update (MODERATE)

oracle-oval
около 2 месяцев назад

ELBA-2025-4872: rpm-ostree bug fix and enhancement update (MODERATE)

CVSS3: 6.2
fstec
больше 1 года назад

Уязвимость пакета rpm-ostree операционных систем Red Hat Enterprise Linux и Fedora, позволяющая нарушителю получить несанкционированный доступ к аутентификационным данным

EPSS

Процентиль: 2%
0.00017
Низкий

6.2 Medium

CVSS3