Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1437770 - (CVE-2017-2665) CVE-2017-2665 rhscon-core: creates world readable file /etc/skyring/skyring.conf which leaks mongodb password for skyring database
CVE-2017-2665 rhscon-core: creates world readable file /etc/skyring/skyring.c...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170411,repor...
: Security
Depends On:
Blocks: 1435445
  Show dependency treegraph
 
Reported: 2017-03-31 02:30 EDT by Siddharth Sharma
Modified: 2018-09-07 16:58 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-05-04 07:21:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Siddharth Sharma 2017-03-31 02:30:16 EDT
Description:

skyring-setup command creates random password for mongodb skyring database
but it writes password in plain text to /etc/skyring/skyring.conf file which
is owned by root but read by local user. Any local user who has access to
system running skyring service will be able to get password in plain text.
Comment 1 Siddharth Sharma 2017-03-31 02:30:28 EDT
Acknowledgments:

Name: Siddharth Sharma
Comment 3 Siddharth Sharma 2017-04-11 00:05:10 EDT
Mitigation:

~]# chmod 600 /etc/skyring/skyring.conf
Comment 4 Leonardo Taccari 2018-09-07 16:58:50 EDT
Hello folks,
I think that recently CVE-2017-2665 had CPE information added.

According the description of the CVE and this bug report it seems that
it just affect rhscon-core. Is this right?

Please let me know and I'll try to request an amend via <https://cveform.mitre.org/>.


Thank you!

Note You need to log in before you can comment on or make changes to this bug.