This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2017-7537 pki-core: mock CMC authentication plugin with hardcoded secret enabled by default
Product:
[Other] Security Response
Reporter:
Adam Mariš <amaris>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
medium
Docs Contact:
Priority:
medium
Version:
unspecified CC:
aakkiang, alee, cfu, dkholia, dsirrine, edewata, enewland, kwright, mharmsen, rhcs-maint, security-response-team
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
Doc Type:
If docs needed, set a value
Doc Text:
It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
Story Points:
---
Clone Of:
Environment:
Last Closed:
2017-08-02 08:29:35 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1469432 , 1470947 , 1470948
Bug Blocks:
1470819
Attachments: