Bug 1510149 (CVE-2017-15104) - CVE-2017-15104 heketi: Information disclosure through world readable file
Summary: CVE-2017-15104 heketi: Information disclosure through world readable file
Alias: CVE-2017-15104
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1510283 1527160 1527161
Blocks: 1507642 1510610
TreeView+ depends on / blocked
Reported: 2017-11-06 18:53 UTC by Pedro Sampaio
Modified: 2021-02-17 01:17 UTC (History)
20 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An access flaw was found in heketi, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
Clone Of:
Last Closed: 2017-12-20 05:05:14 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3481 0 normal SHIPPED_LIVE Important: heketi security update 2017-12-18 22:24:25 UTC

Description Pedro Sampaio 2017-11-06 18:53:30 UTC
It was discovered that sensitive information could be disclosed through world readable file heketi.json containing private keys in heketi 5.x and previous.


Comment 1 Pedro Sampaio 2017-11-06 18:53:42 UTC

Name: Siddharth Sharma (Red Hat)

Comment 4 Eric Christensen 2017-12-08 14:22:11 UTC
In reply to comment 0:
Does this also mean that the passwords are not being stored properly (hashed, or at least encrypted) as well?

Comment 6 Siddharth Sharma 2017-12-18 17:03:53 UTC
Created heketi tracking bugs for this issue:

Affects: epel-all [bug 1527161]
Affects: fedora-all [bug 1527160]

Comment 7 errata-xmlrpc 2017-12-18 17:25:02 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.3 for RHEL 7

Via RHSA-2017:3481 https://access.redhat.com/errata/RHSA-2017:3481

Note You need to log in before you can comment on or make changes to this bug.