Bug 1362553 (CVE-2016-6494)

Summary: CVE-2016-6494 mongodb: world-readable .dbshell history file
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abhgupta, admiller, aortega, apevec, ayoung, bhu, bkearney, bretm, cbillett, ccoleman, chris, chrisw, cvsbot-xmlrpc, databases-maint, dedgar, dmcphers, esammons, fpercoco, hhorak, iboverma, jdornak, jgoulding, jialiu, jmatthew, joelsmith, johan.o.hedin, jokerman, jorton, jpacner, jross, jschluet, katello-bugs, kbasil, kseifried, lhh, lmeyer, lpeer, markmc, matt, mcressma, mmccomas, mmccune, mrg-program-list, mskalick, npmccallum, ohadlevy, praiskup, rbryant, rhui-bugs, satellite6-bugs, sclewis, srevivo, strobert, tdawson, tdecacqu, tiwillia, tjay, tlestach, tomckay, trepik, tsanders, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-08-02 13:41:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1362554, 1362555, 1862990    
Bug Blocks:    

Description Martin Prpič 2016-08-02 13:39:02 UTC
It was found that MongoDB creates a world-readable .dbshell history file in a user's directory:

The mongodb client doesn't store authentication commands, but there's still information leakage, though, even if only about database and collection names, or data structure.

As for data itself, the history could also contain sensitive information; for instance, if usernames for some other service were stored in a mongo collection, the history could contain lines like:

  db.users.find({user:"foo"})

or even:

  db.users.update({user:"foo"},{$set:{password:"OhComeOnNow"}})

Upstream bug (closed as "Works as Designed"):

https://jira.mongodb.org/browse/SERVER-25335

CVE request:

http://seclists.org/oss-sec/2016/q3/199

Comment 1 Martin Prpič 2016-08-02 13:40:47 UTC
Created mongodb tracking bugs for this issue:

Affects: fedora-all [bug 1362554]
Affects: epel-all [bug 1362555]

Comment 2 Marek Skalický 2016-08-02 14:18:37 UTC
So should be Fedora and EPEL bugs fixed if this bug is closed as WONTFIX?

Comment 3 Martin Prpič 2016-08-02 14:33:50 UTC
(In reply to Marek Skalický from comment #2)
> So should be Fedora and EPEL bugs fixed if this bug is closed as WONTFIX?

I'll leave that decision to the Fedora/EPEL maintaner but seeing as this was closed upstream, and home directories in RHEL and Fedora are not world readable to other users, I don't see this as something worth developing an out-of-band patch for.

Comment 4 Pavel Raiskup 2016-09-27 06:15:25 UTC
FWIW, this seems to be fixed upstream in the end, in link from comment #0.

Comment 5 Marek Skalický 2016-09-27 08:46:27 UTC
Fedora/EPEL bugs are already fixed/in testing.