oss-sec mailing list archives

CVE request: wicd writes sensitive information in log files (password, passphrase...)


From: Kurt Seifried <kseifried () redhat com>
Date: Thu, 26 Jan 2012 16:06:07 -0700

wicd writes sensitive information in log files (password, passphrase...)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652417

From: Vincent Lefevre <vincent () vinc17 net>
To: Debian Bug Tracking System <submit () bugs debian org>
Subject: wicd writes sensitive information in log files (password,
 passphrase...)
Date: Sat, 17 Dec 2011 03:27:32 +0100

Package: wicd
Version: 1.7.1~b3-3
Severity: grave
Tags: security
Justification: user security hole

wicd writes sensitive information in log files (under /var/log/wicd),
such as passwords and passphrases. Users in the adm group can have
access to them, but also log files are meant to be sent in bug
reports, and if the bug reporter doesn't pay attention, there is
a huge risk to transmit such information.

http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/682

=== modified file 'wicd/configmanager.py'
--- wicd/configmanager.py       2011-12-15 18:21:53 +0000
+++ wicd/configmanager.py       2011-12-17 06:55:18 +0000
@@ -120,8 +120,13 @@
             ret = to_unicode(ret)
             if default:
                 if self.debug:
-                    print ''.join(['found ', option, ' in configuration ',
-                                   str(ret)])
+                    # mask out sensitive information
+                    if option in ['apsk', 'password', 'identity',
'private_key', \
+                                  'private_key_passwd', 'key',
'passphrase']:
+                        print ''.join(['found ', option, ' in
configuration *****'])
+                    else:
+                        print ''.join(['found ', option, ' in
configuration ',
+                                       str(ret)])
         else:
             if default != "__None__":
                 print 'did not find %s in configuration, setting
default %s' % (option, str(default))


-- 
Kurt Seifried Red Hat Security Response Team (SRT)


Current thread: