Bug 1510149 (CVE-2017-15104) - CVE-2017-15104 heketi: Information disclosure through world readable file
Summary: CVE-2017-15104 heketi: Information disclosure through world readable file
Alias: CVE-2017-15104
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=low,public=20171218,reported=2...
Keywords: Security
Depends On: 1510283 1527160 1527161
Blocks: 1507642 1510610
TreeView+ depends on / blocked
Reported: 2017-11-06 18:53 UTC by Pedro Sampaio
Modified: 2019-07-22 04:57 UTC (History)
19 users (show)

An access flaw was found in heketi, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
Clone Of:
Last Closed: 2017-12-20 05:05:14 UTC

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3481 normal SHIPPED_LIVE Important: heketi security update 2017-12-18 22:24:25 UTC

Description Pedro Sampaio 2017-11-06 18:53:30 UTC
It was discovered that sensitive information could be disclosed through world readable file heketi.json containing private keys in heketi 5.x and previous.


Comment 1 Pedro Sampaio 2017-11-06 18:53:42 UTC

Name: Siddharth Sharma (Red Hat)

Comment 4 Eric Christensen 2017-12-08 14:22:11 UTC
In reply to comment 0:
Does this also mean that the passwords are not being stored properly (hashed, or at least encrypted) as well?

Comment 6 Siddharth Sharma 2017-12-18 17:03:53 UTC
Created heketi tracking bugs for this issue:

Affects: epel-all [bug 1527161]
Affects: fedora-all [bug 1527160]

Comment 7 errata-xmlrpc 2017-12-18 17:25:02 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.3 for RHEL 7

Via RHSA-2017:3481 https://access.redhat.com/errata/RHSA-2017:3481

Note You need to log in before you can comment on or make changes to this bug.