oss-sec mailing list archives

Re: Re: Chef: knife bootstrap leaks validator privkey into system logs


From: Jan Schaumann <jschauma () netmeister org>
Date: Mon, 14 Dec 2015 16:42:06 -0500

cve-assign () mitre org wrote:
 
In general, an issue with unlogged private data on a command line
sometimes does not have a CVE ID, if the command line only occurs
during initial installation of a machine, before any unprivileged user
accounts would have access. (We don't know enough about the use cases
to determine whether that sometimes applies to chef.)

It's possible that Chef is installed/bootstrapped on a system that is
already configured/set-up and used by other users.

User management may be done entirely outside of Chef, so that there is
no universal guarantee that Chef would only ever be installed when no
other unprivileged users would have access to the system (even if that
is likely to be the majority of the use cases).

https://github.com/chef/chef/issues/3872

creates private files via here-doc cat(1)ing followed by running
chmod(1) and setting the permissions.

This is a race condition if the default umask creates files world- or
group-readable (as is almost universally the case).

3872 was linked from 3871. If there is a race-condition vulnerability
disclosed in 3872, we may be able to assign a CVE ID. (We would not
want a CVE if the issue can occur only before unprivileged user
accounts would have access.)

As above: no such guarantee, even though most people may well bootstrap
Chef only in such environments.

-Jan


Current thread: