|
|
Message-Id: <1490987389.392790.930214152.29A71F3D@webmail.messagingengine.com>
Date: Fri, 31 Mar 2017 14:09:49 -0500
From: Mark Felder <feld@...d.me>
To: oss-security@...ts.openwall.com
Subject: CVE Request -- mapr: information disclosure vulnerability
Hello,
The mapr web frontend component creates an information disclosure
vulnerability. During the setup of mapr the configure.sh script calls a
function ConfigureWSRole:
function ConfigureWSRole() {
if [ $clientOnly -eq 0 -a $dontChangeSecurityPermissionsOn -eq 0 ];
then
ConfigureRunUserForWS
fi
This calls ConfigureRunUserForWS from configure-common.sh:
function ConfigureRunUserForWS() {
local val=`getent group shadow 2>/dev/null`
if [ "$?" != "0" -o "$val" = "" ]; then
# Create a group named shadow
groupadd shadow >> $logFile 2>&1
fi
# Add CURR_USER to the group wheel
if [ -f /etc/SuSE-release ]; then
# Add CURR_USER to the group wheel for SUSE
usermod -A shadow $MAPR_USER >> $logFile 2>&1
STATUS=$?
#
# The '-A' option has been removed from SuSE 12
#
if [ $STATUS -ne 0 ]; then
usermod -a -G shadow $MAPR_USER >> $logFile 2>&1
fi
else
usermod -a -G $MAPR_GROUP,shadow $MAPR_USER >> $logFile 2>&1
fi
# Change group-owner of /etc/shadow
chgrp shadow /etc/shadow >> $logFile 2>&1
# Allow read permissions for user shadow
chmod ug+r /etc/shadow >> $logFile 2>&1
}
This results in a shadow file that is now readable to the application:
# ls -la /etc/shadow
-r--r-----. 1 root shadow 657 Mar 30 16:09 /etc/shadow
# grep shadow /etc/group
shadow:x:1000:mapr
The option to disable this codepath, -no-auto-permission-update, is not
recommended by Mapr and comes with a warning in the script as it will
break the webserver's ability to authenticate the local mapr user, which
is used to administer the cluster:
echo " -no-auto-permission-update - do not update the system
security permissions automatically"
echo " Warn: Features like WebServer
might not work properly"
echo " default: disabled"
The website docs[1] casually describe the option, "Pass this option to
prevent MapR from silently altering permissions in /etc/shadow."
These files are part of the mapr-core-internal package:
# rpm -fq /opt/mapr/server/configure.sh
mapr-core-internal-5.2.0.39122.GA-1.x86_64
# rpm -fq /opt/mapr/server/configure-common.sh
mapr-core-internal-5.2.0.39122.GA-1.x86_64
Thanks
[1] http://maprdocs.mapr.com/home/ReferenceGuide/configure.sh.html
--
Mark Felder
feld@...d.me
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.