Bug 1511623 (CVE-2017-15111)

Summary: CVE-2017-15111 keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: apevec, chrisw, jdennis, jjoyce, jschluet, kbasil, kseifried, lhh, lpeer, markmc, mburns, nkinder, osoukup, psampaio, rbryant, rhos-maint, sclewis, security-response-team, slinaber, slong, tdecacqu
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: keycloak 0.8 Doc Type: If docs needed, set a value
Doc Text:
It was discovered that keycloak-httpd-client-install uses a predictable log file name in /tmp. A local attacker could create a symbolic link to a sensitive location, possibly causing data corruption or denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-08-06 13:18:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1531296, 1531338, 1531339, 1531340, 1533190    
Bug Blocks: 1517252    

Description Pedro Sampaio 2017-11-09 18:02:36 UTC
A flaw was discovered in keycloak-httpd-client-install version 0.6-2. The --log-file option in keycloak_cli.py insecurely passes the script name for the log file creation.

Comment 1 John Dennis 2017-11-09 18:52:15 UTC
Could you please explain the security issue, I do not follow from the terse "insecurely passes the script name for the log file creation" phrase.

Comment 9 Summer Long 2018-01-04 23:01:31 UTC
Created keycloak-httpd-client-install tracking bugs for this issue:

Affects: fedora-all [bug 1531296]

Comment 17 Andrej Nemec 2018-05-14 12:21:37 UTC
Statement:

Red Hat Product Security has rated this issue as having security impact of Low. This issue may be fixed in a future version of Red Hat Enterprise Linux.

OpenStack users please note, this issue is present in:
* Red Hat OpenStack Platform 9.0 (Mitaka)
* Red Hat OpenStack Platform 10.0 (Newton) 
* Red Hat OpenStack Platform 11.0 (Ocata)

If a fixed version of keycloak-httpd-client-install is made available in Red Hat Enterprise Linux, OpenStack customers should consume this package directly from the Red Hat Enterprise Linux channel (this occurs during normal updates).

Comment 18 errata-xmlrpc 2019-08-06 12:19:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:2137 https://access.redhat.com/errata/RHSA-2019:2137

Comment 19 Product Security DevOps Team 2019-08-06 13:18:28 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2017-15111