Bug 1437770 (CVE-2017-2665)

Summary: CVE-2017-2665 rhscon-core: creates world readable file /etc/skyring/skyring.conf which leaks mongodb password for skyring database
Product: [Other] Security Response Reporter: Siddharth Sharma <sisharma>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: iamleot+rhbugzilla, nthomas, sankarshan, security-response-team, sisharma
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-05-04 11:21:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1435445    

Description Siddharth Sharma 2017-03-31 06:30:16 UTC
Description:

skyring-setup command creates random password for mongodb skyring database
but it writes password in plain text to /etc/skyring/skyring.conf file which
is owned by root but read by local user. Any local user who has access to
system running skyring service will be able to get password in plain text.

Comment 1 Siddharth Sharma 2017-03-31 06:30:28 UTC
Acknowledgments:

Name: Siddharth Sharma

Comment 3 Siddharth Sharma 2017-04-11 04:05:10 UTC
Mitigation:

~]# chmod 600 /etc/skyring/skyring.conf

Comment 4 Leonardo Taccari 2018-09-07 20:58:50 UTC
Hello folks,
I think that recently CVE-2017-2665 had CPE information added.

According the description of the CVE and this bug report it seems that
it just affect rhscon-core. Is this right?

Please let me know and I'll try to request an amend via <https://cveform.mitre.org/>.


Thank you!