Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1591480 - (CVE-2018-10871) CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default
CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180618,repor...
: Security
: 1591481 (view as bug list)
Depends On: 1592226 1592228 1595766
Blocks: 1591482
  Show dependency treegraph
 
Reported: 2018-06-14 16:19 EDT by Laura Pardo
Modified: 2018-07-17 17:21 EDT (History)
8 users (show)

See Also:
Fixed In Version: 389-ds-base 1.3.8.5, 389-ds-base 1.4.0.12
Doc Type: If docs needed, set a value
Doc Text:
By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-06-14 16:19:40 EDT
By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores password in plaintext format in their respective changelog files.

An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
Comment 2 Cedric Buissart 2018-06-18 04:49:57 EDT
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 1592226]
Comment 4 Cedric Buissart 2018-06-27 09:38:08 EDT
*** Bug 1591481 has been marked as a duplicate of this bug. ***
Comment 6 Cedric Buissart 2018-06-27 09:51:48 EDT
External References:

https://pagure.io/389-ds-base/issue/49789
Comment 9 Cedric Buissart 2018-06-27 11:02:48 EDT
Mitigation:

On 389-ds-base 1.3.1 and above: 
1- Deactivate clear password storing by default, to prevent new passwords to be logged.
-> in cn=config, set nsslapd-unhashed-pw-switch attribute to 'off' or 'nolog'

2- Trim changelog to ensure currently stored passwords are removed.
For Replication:
-> in cn=changelog5,cn=config, reduce nsslapd-changelogmaxentries, nsslapd-changelogtrim-interval and nsslapd-changelogmaxage
-> force a replication & wait for the changelogtrim-interval time
-> restore previous values

For RetroChangelog:
-> deactivate the plugin
-> restart directory server
-> reactivate the plugin
-> restart directory server

Note You need to log in before you can comment on or make changes to this bug.