MongoDB Skyring Database skyring-setup skyring.conf Password credentials management
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.0 | $0-$5k | 0.00 |
A vulnerability classified as problematic was found in MongoDB Skyring Database (Database Software) (unknown version). Affected by this vulnerability is an unknown code block of the file /etc/skyring/skyring.conf of the component skyring-setup. The manipulation with an unknown input leads to a credentials management vulnerability (Password). The CWE definition for the vulnerability is CWE-255. As an impact it is known to affect confidentiality. The summary by CVE is:
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
The bug was discovered 05/04/2017. The weakness was published 07/06/2018 by Siddharth Sharma as not defined bug report (Bugzilla). It is possible to read the advisory at bugzilla.redhat.com. This vulnerability is known as CVE-2017-2665 since 12/01/2016. Attacking locally is a requirement. The requirement for exploitation is a single authentication. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1552 according to MITRE ATT&CK.
The vulnerability was handled as a non-public zero-day exploit for at least 428 days. During that time the estimated underground price was around $0-$5k.
It is possible to mitigate the problem by applying the configuration setting chmod 600 /etc/skyring/skyring.conf
.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 97612†). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 5.0
VulDB Base Score: 3.3
VulDB Temp Score: 3.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.0
NVD Vector: 🔍
CNA Base Score: 4.8
CNA Vector (Red Hat, Inc.): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: PasswordClass: Credentials management / Password
CWE: CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: ConfigStatus: 🔍
0-Day Time: 🔍
Config: chmod 600 /etc/skyring/skyring.conf
Timeline
12/01/2016 🔍04/13/2017 🔍
05/04/2017 🔍
07/06/2018 🔍
07/06/2018 🔍
07/06/2018 🔍
04/03/2023 🔍
Sources
Advisory: bugzilla.redhat.comResearcher: Siddharth Sharma
Status: Not defined
Confirmation: 🔍
CVE: CVE-2017-2665 (🔍)
GCVE (CVE): GCVE-0-2017-2665
GCVE (VulDB): GCVE-100-120475
SecurityFocus: 97612 - Red Hat Storage Console CVE-2017-2665 Insecure Password Storage Information Disclosure Vulnerability
Entry
Created: 07/06/2018 10:05 PMUpdated: 04/03/2023 07:02 PM
Changes: 07/06/2018 10:05 PM (63), 02/26/2020 08:59 AM (5), 04/03/2023 07:02 PM (13)
Complete: 🔍
Cache ID: 18:FA6:40
No comments yet. Languages: en.
Please log in to comment.