[Bug 1217402] New: AUDIT-FIND: Updating server configuration as root while parsing untrusted data
https://bugzilla.suse.com/show_bug.cgi?id=1217402 Bug ID: 1217402 Summary: AUDIT-FIND: Updating server configuration as root while parsing untrusted data Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: fstrba@suse.com Reporter: jsegitz@suse.com QA Contact: qa-bugs@suse.de Target Milestone: --- Found By: --- Blocker: --- With the new tomcat10 packages I stumbled across: 687 %post webapps 688 %{serverxmltool} add-context.xslt docBase=%{tomcatappdir}/ROOT path=/ 689 %{serverxmltool} add-context.xslt docBase=%{tomcatappdir}/sample path=/sample 690 %{serverxmltool} add-context.xslt docBase=%{tomcatappdir}/examples path=/examples This translates to e.g. /usr/libexec/tomcat/serverxml-tool.sh add-context.xslt docBase=/usr/share/tomcat/tomcat-webapps/ROOT path=/ serverxml-tool.sh invokes java with serverxmltool.jar to update /etc/tomcat/server.xml. All of this runs as root and parses XML. I didn't find a security issue with this (but also just spend a couple of minutes on this), but it's a bigger risk than necessary. Apart from overwriting the config file root privileges are not needed. Especially the java call should not run as root, xml operations are notoriously dangerous. runuser is a good tool for this. You can do the XML parsing as the tomcat user and then if necessary overwrite the tomcat config with an update file. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1217402 Fridrich Strba <fstrba@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |michele.bussolotto@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1217402 Fridrich Strba <fstrba@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|fstrba@suse.com |michele.bussolotto@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1217402 Fridrich Strba <fstrba@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC|michele.bussolotto@suse.com |fstrba@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1217402 https://bugzilla.suse.com/show_bug.cgi?id=1217402#c6 --- Comment #6 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:0472-1: An update that solves five vulnerabilities and has two security fixes can now be installed. Category: security (important) Bug References: 1216118, 1216119, 1216120, 1217402, 1217649, 1217768, 1219208 CVE References: CVE-2023-42794, CVE-2023-42795, CVE-2023-45648, CVE-2023-46589, CVE-2024-22029 Sources used: openSUSE Leap 15.5 (src): tomcat-9.0.85-150200.57.1 Web and Scripting Module 15-SP5 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Manager Server 4.3 (src): tomcat-9.0.85-150200.57.1 SUSE Enterprise Storage 7.1 (src): tomcat-9.0.85-150200.57.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com