Bug 988998 - (CVE-2013-4481) CVE-2013-4481 luci: short exposure of authentication secrets while generating configuration file
CVE-2013-4481 luci: short exposure of authentication secrets while generating...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Unspecified
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20131120,reported=2...
: Security
Depends On: 1005385
Blocks: 974906 990750
  Show dependency treegraph
 
Reported: 2013-07-26 17:17 EDT by Jan Pokorný
Modified: 2014-12-10 09:09 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way luci generated its configuration file. The file was created as world readable for a short period of time, allowing a local user to gain access to the authentication secrets stored in the configuration file.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-11-21 09:25:43 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Comment 2 Vincent Danen 2013-08-08 15:29:39 EDT
It was discovered that the luci configuration file was generated in an insecure manner.  Because the configuration is generated on-demand via the luci initscript from a template, and because it is created and then has its permissions changed, the /var/lib/luci/etc/luci.ini file contents are briefly exposed to local users due to world-readable permissions.


Acknowledgements:

This issue was discovered by Jan Pokorný of Red Hat.
Comment 12 Tomas Hoger 2013-11-20 14:01:43 EST
Lifting embargo.
Comment 13 errata-xmlrpc 2013-11-21 05:33:27 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1603 https://rhn.redhat.com/errata/RHSA-2013-1603.html

Note You need to log in before you can comment on or make changes to this bug.