Bug 1437770 - (CVE-2017-2665) CVE-2017-2665 rhscon-core: creates world readable file /etc/skyring/skyring.conf which leaks mongodb password for skyring database
CVE-2017-2665 rhscon-core: creates world readable file /etc/skyring/skyring.c...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
Blocks: 1435445
  Show dependency treegraph
Reported: 2017-03-31 02:30 EDT by Siddharth Sharma
Modified: 2017-05-04 07:21 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2017-05-04 07:21:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Siddharth Sharma 2017-03-31 02:30:16 EDT

skyring-setup command creates random password for mongodb skyring database
but it writes password in plain text to /etc/skyring/skyring.conf file which
is owned by root but read by local user. Any local user who has access to
system running skyring service will be able to get password in plain text.
Comment 1 Siddharth Sharma 2017-03-31 02:30:28 EDT

Name: Siddharth Sharma
Comment 3 Siddharth Sharma 2017-04-11 00:05:10 EDT

~]# chmod 600 /etc/skyring/skyring.conf

Note You need to log in before you can comment on or make changes to this bug.