An information disclosure vulnerability was found in libvirt. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw could allow a malicious user with a read-only connection to access potentially sensitive information in the domain configuration via the `dumpxml` command.
DescriptionMauro Matteo Cascella
2020-06-18 16:30:25 UTC
Starting with version 6.2.0, libvirt makes it possible to pass one or more cookies to access disk images via http/https network protocols:
<disk type="network" device="cdrom">
<source protocol="https" name="/path/to/image.iso">
<cookies>
<cookie name="cookie_name">"cookie_value"</cookie>
</cookies>
</disk>
The 'cookie' element is included in the XML dump of the guest domain, resulting in a possible information disclosure. An attacker could abuse this flaw to leak the cookie's value via the virsh dumpxml command. Since cookies typically contain sensitive information, they should only be included in the XML dump when using the --security-info attribute.
Upstream fix:
https://github.com/libvirt/libvirt/commit/a5b064bf4b17a9884d7d361733737fb614ad8979https://github.com/libvirt/libvirt/commit/524de6cc35d3b222f0e940bb0fd027f5482572c5
Comment 1Mauro Matteo Cascella
2020-06-18 16:30:34 UTC
Acknowledgments:
Name: Han Han (Red Hat)
Comment 2Mauro Matteo Cascella
2020-06-19 10:34:23 UTC
Statement:
Support for cookies for HTTP based disks was introduced in `libvirt` upstream version 6.2.0. Red Hat Enterprise Linux 5, 6, 7 and 8 are not affected by this issue, as they ship older versions of the `libvirt` package. Red Hat Enterprise Linux Advanced Virtualization 8 is the only affected product.
Comment 7Product Security DevOps Team
2020-11-04 02:26:07 UTC
Starting with version 6.2.0, libvirt makes it possible to pass one or more cookies to access disk images via http/https network protocols: <disk type="network" device="cdrom"> <source protocol="https" name="/path/to/image.iso"> <cookies> <cookie name="cookie_name">"cookie_value"</cookie> </cookies> </disk> The 'cookie' element is included in the XML dump of the guest domain, resulting in a possible information disclosure. An attacker could abuse this flaw to leak the cookie's value via the virsh dumpxml command. Since cookies typically contain sensitive information, they should only be included in the XML dump when using the --security-info attribute. Upstream fix: https://github.com/libvirt/libvirt/commit/a5b064bf4b17a9884d7d361733737fb614ad8979 https://github.com/libvirt/libvirt/commit/524de6cc35d3b222f0e940bb0fd027f5482572c5