[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
(ITS#8328) Information leak in slapo-auditlog
Full_Name: Moritz M.hlenhoff
Version: 2.4.40
OS: Debian
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (91.96.145.189)
I setup a test system which made use of the slapo-auditlog overlay using these
config options:
moduleload auditlog
overlay auditlog
auditlog /var/lib/ldap/slapd-audit.log
The /var/lib/ldap/slapd-audit.log was created with world-readable permissions,
which constitutes a security issue since that file also logs sensitive
attributes which are otherwise protected by ACLs (such as password hashes).
Proposed patch:
diff -aur openldap-2.4.40+dfsg.orig/servers/slapd/overlays/auditlog.c
openldap-2.4.40+dfsg/rvrvers/slapd/overlays/auditlog.c
--- openldap-2.4.40+dfsg.orig/servers/slapd/overlays/auditlog.c 2014-09-19
01:48:49.000000000 +0000
+++ openldap-2.4.40+dfsg/servers/slapd/overlays/auditlog.c 2015-12-02
11:08:24.331146770 +0000
@@ -121,6 121,7 @@
peername = op->o_conn->c_peer_name;
ldap_pvt_thread_mutex_lock(&ad->ad_mutex);
+ umask(027);
if((f = fopen(ad->ad_logfile, "a")) == NULL) {
ldap_pvt_thread_mutex_unlock(&ad->ad_mutex);
return SLAP_CB_CONTINUE;