Vulnerability Description
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mongodb | Mongodb | - |
| Redhat | Storage Console | 2.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97612Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2665Issue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/97612Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2665Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-2665?
CVE-2017-2665 is a vulnerability with a CVSS score of 4.8 (MEDIUM). The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any...
How severe is CVE-2017-2665?
CVE-2017-2665 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2665?
Check the references section above for vendor advisories and patch information. Affected products include: Mongodb Mongodb, Redhat Storage Console.