First published: Fri Jul 06 2018(Updated: )
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB MongoDB | ||
Redhat Storage Console | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2665 is a vulnerability in the skyring-setup command that creates a random password for the mongodb skyring database but writes the password in plain text to the /etc/skyring/skyring.conf file.
The Mongodb Mongodb and Redhat Storage Console versions 2.0 are affected by CVE-2017-2665.
CVE-2017-2665 has a severity rating of high with a value of 7.
To fix CVE-2017-2665, you should update skyring-setup to write the password securely and restrict access to the /etc/skyring/skyring.conf file.
Yes, you can find more information about CVE-2017-2665 on the following references: [Security Focus](http://www.securityfocus.com/bid/97612) and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2665).