Project

General

Profile

Actions

Bug #43607

closed

Feature #47765: mgr/dashboard: security improvements

mgr/dashboard: fix improper URL checking

Added by Ernesto Puerta over 4 years ago. Updated about 3 years ago.

Status:
Resolved
Priority:
Immediate
Category:
General - Back-end
Target version:
% Done:

0%

Source:
Community (user)
Tags:
Backport:
nautilus
Regression:
No
Severity:
1 - critical
Reviewed:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

From https://github.com/rook/rook/issues/4635

Only release 14.2.5 and above show this behaviour (including master) introduced in https://github.com/ceph/ceph/pull/30694.

Assigned CVE-2020-1699

CWE-22


Related issues 1 (0 open1 closed)

Copied to Dashboard - Backport #43725: nautilus: mgr/dashboard: fix improper URL checkingResolvedErnesto PuertaActions
Actions #1

Updated by Ernesto Puerta over 4 years ago

  • Priority changed from High to Immediate
  • Tags set to security
  • Severity changed from 2 - major to 1 - critical
Actions #2

Updated by Ernesto Puerta over 4 years ago

  • Status changed from New to In Progress
  • Pull request ID set to 32652
Actions #3

Updated by Lenz Grimmer over 4 years ago

Unfortunately the referenced rook issue does not provide any details about the problem. In regular deployments, the Mgr process does not run with root privileges, so the dashboard module should not be able to access any sensitive files. Is this different from how Ceph is deployed by Rook?

Actions #4

Updated by Ernesto Puerta over 4 years ago

  • Description updated (diff)
  • Affected Versions v14.2.5, v14.2.6, v15.0.0 added
Actions #5

Updated by Ernesto Puerta over 4 years ago

  • Private changed from Yes to No
Actions #6

Updated by Ernesto Puerta over 4 years ago

Lenz Grimmer wrote:

Unfortunately the referenced rook issue does not provide any details about the problem. In regular deployments, the Mgr process does not run with root privileges, so the dashboard module should not be able to access any sensitive files. Is this different from how Ceph is deployed by Rook?

As mentioned by e-mail, anything under ceph:ceph ownership could be exposed, and depending on the deployment setup that might mean a lot:
- Ceph keyrings
- Ceph logs (ceph-mgr exposes sensitive information as described in https://tracker.ceph.com/issues/37503, including ceph-dashboard admin password, RGW secrets, etc).
- Ceph daemon data (/var/lib/ceph)
- procfs info from Ceph processes

Actions #7

Updated by Ernesto Puerta over 4 years ago

  • Description updated (diff)
Actions #8

Updated by Ernesto Puerta over 4 years ago

  • Private changed from No to Yes
Actions #9

Updated by Sage Weil over 4 years ago

  • Status changed from In Progress to Pending Backport
Actions #10

Updated by Nathan Cutler over 4 years ago

  • Copied to Backport #43725: nautilus: mgr/dashboard: fix improper URL checking added
Actions #11

Updated by Ernesto Puerta over 4 years ago

  • Copied to deleted (Backport #43725: nautilus: mgr/dashboard: fix improper URL checking)
Actions #12

Updated by Ernesto Puerta over 4 years ago

  • Copied to Backport #43725: nautilus: mgr/dashboard: fix improper URL checking added
Actions #13

Updated by Lenz Grimmer about 4 years ago

  • Translation missing: en.field_tag_list set to security
  • Status changed from Pending Backport to Resolved
  • Private changed from Yes to No
  • Tags deleted (security)
Actions #14

Updated by Ernesto Puerta over 3 years ago

  • Parent task set to #47765
Actions #15

Updated by Ernesto Puerta about 3 years ago

  • Project changed from mgr to Dashboard
  • Category changed from 146 to General - Back-end
Actions

Also available in: Atom PDF