Bug 1873131 (CVE-2020-14371)

Summary: CVE-2020-14371 Satellite: Compute resource credential leak
Product: [Other] Security Response Reporter: Yadnyawalk Tale <ytale>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbuckingham, bcourt, bkearney, btotty, hhudgeon, lzap, mmccune, mrichter, nmoumoul, rchan, rjerrido, sokeeffe
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A credential leak vulnerability was found in Red Hat Satellite. This flaw exposes the compute resources credentials through VMs that are running on these resources in Satellite.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-27 11:32:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1872333    
Bug Blocks: 1872454    

Description Yadnyawalk Tale 2020-08-27 13:04:09 UTC
A credential leak vulnerability was identified on Red Hat Satellite which will expose compute resources credential through VMs that are running on these resources in Satellite.

Comment 4 Guilherme de Almeida Suckevicz 2020-08-27 17:35:50 UTC
Acknowledgments:

Name: Evgeni Golov (Red Hat)

Comment 11 Yadnyawalk Tale 2020-08-31 15:55:11 UTC
* Frequently Asked Questions for CVE-2020-14371:

Q: What is the impact of the flaw?
A: It is a moderate severity flaw and difficult to exploit in general. Please refer following classification for more information on severity: https://access.redhat.com/security/updates/classification

Q: What type of flaw is this?
A: Plaintext password (credential) leak via JSON. In the CWE world this is known for CWE-200.

Q: How does this flaw work?
A: Authenticated attacker of Satellite can acquire credentials of compute resources by inspecting VMs that are running on these resources.

Q: Does an attacker need to have an account on Red Hat Satellite to exploit this?
A: Yes, attacker need to have an account in Red Hat Satellite.

Q: How do attacker choose to exploit this?
A: They could exploit this through API endpoint, when authenticated attacker hit "https://hostname.com/api/redacted_path/redacted_path/redacted_path" endpoint (can't disclose this redacted_path) it will return JSON which have the  credentials of the compute resource "client" used to manage this host on it.

Q: Which components from Satellite are affected by this?
A: Reporter only reported this issue against oVirt/RHV and users with host_view permissions, however, we are still investigating which other components are affected by this.

Q: What should be the expected result?
A: Users with host_view permissions privileges should never see the credentials of a compute resource client.

Q: Which version of Satellite is affected?
A: Flaw reported against Satellite 6.6.3 with oVirt/RHV compute resource, however we believe that Satellite 6.7 is also affected

Q: How can I fix this vulnerability? Is there any workaround?
A: Fixes are not released yet, there is no workaround found at the moment.

Q: Current status.
A: Engineering currently discussing on fix and cause of this vulnerability.

Comment 12 RaTasha Tillery-Smith 2020-09-01 14:21:54 UTC
Statement:

Red Hat Satellite is vulnerable to the compute resource credential leak through VMs that are running on these resources in Satellite. Red Hat Product Security has rated this flaw as having a security impact of Moderate. Please refer to https://access.redhat.com/security/updates/classification for clarification on the scoring.

Comment 14 Product Security DevOps Team 2021-05-27 11:32:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14371