First published: Wed Jan 09 2013(Updated: )
Michael Scherer (misc) of Red Hat reports: Looking at a recent git checkout of openshift, I found that some script use a hardcoded or easy to guess filename in /tmp, in this case : <a href="https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L13">https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L13</a> I am not sure this can be exploited, but after searching a while, here is a credible attack. This filename is used on <a href="https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L144">https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L144</a> While it took me a while to figure what the code of lockwrap does exactly, I found out there is a small windows of time between "we check the file exist and is empty" and "we write 0 or a return code to the file". Let's imagine the following scenario, some attacker has shell access to the server that run this ( ie, a openshift node if I am not wrong ). People have access to the node, at least on openshift-online and this is required to push with git the code ( unless setup otherwise ). This attacker create 5000 empty files who match the pattern /tmp/openshift-port-proxy-reload.req.????? ( and this could be something else than numbers, like .aaaaa ). Then he wait, and 1 second after, erase it and replace it by a link to another arbitrary file. Doing it with the 5000 files and a proper timing ( like waiting 1/5000 second between each file operation ) would make sure that if a operation check a file and then 1 second later, write to the file, this would not be the same for at least 1 of them. ( at least, that's my understanding, timing may be harder to get right on a real computer with enough ram, cpu and fast disk than the one I imagined ). Another variant would be to use something that is triggered when stat is run, but inotify cannot be used, and audit subsystem requires root. Then, if someone else run the script and enter the function lockwrap that reload the proxy, it would first do a stat to check the file is empty (<a href="https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L152">https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L152</a>) then reload the proxy ( and check all others file with stat before ), and there is a non negligeable chance that the script would write the return code in a different file ( ie, if that's a link, write it somewhere else ), since it write on all files matching the pattern, and not only the one created by mkstemp. Depending on the kernel configuration and installation, this can be mitigated ( openshift online use polyinstanciation of /tmp, for example, newer kernel ship the yama module, for another example ). But in the most favourable case for the attacker ( ie no protection ), this mean he can create a file in a arbitray location with a content of 0 or 1. The script is executed as root , as part as the user creation : <a href="https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L87">https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L87</a> , function create, just after running useradd command ( hence the assumption this is run as root ) that function call initialize_openshift_port_proxy <a href="https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L139">https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L139</a> that run the command "openshift-port-proxy-cfg setproxy" <a href="https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L583">https://github.com/openshift/origin-server/blob/master/node/lib/openshift-origin-node/model/unix_user.rb#L583</a> that then that script run the function lockwrap : <a href="https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L263">https://github.com/openshift/origin-server/blob/master/port-proxy/bin/openshift-port-proxy-cfg#L263</a> and then lockwrap trigger the problem described before. So a attacker could just create and remove several application until the attack succeed, ie, bruteforce it and make a 0 or 1 be written in a arbitrary location as root ( if selinux, polyinstanciation etc are disabled ). openshift-origin-port-proxy is part of the entreprise release version 1, IIRC, of F18 and rawhide. So I think this will requires a errata and a CVE if I am not wrong on my analysis of the problem. The issue was not discussed with anyone explicitely (I just discussed about the code on #fedora-devel on irc.freenode.net with 2 others fedora packagers but the exact issue was not disclosed ).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openshift | <=1.0 | |
Redhat Openshift Origin | =1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.