Lucene search

K
redhatcveRedhat.comRH:CVE-2017-12173
HistoryOct 04, 2017 - 12:48 p.m.

CVE-2017-12173

2017-10-0412:48:55
redhat.com
access.redhat.com
10

0.002 Low

EPSS

Percentile

53.4%

It was found that sssd’s sysdb_search_user_by_upn_res() function did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

Mitigation

It is possible to disable manually credential caching :

  • Stop the sssd service
  • Delete the cache (rm -f /var/lib/sss/db/* /var/log/sssd/*) or manually remove the hashes for the database
  • In the sssd configuration file, change cache_credentials to False for each domains
  • start the sssd service again

However, tools such as realmd & ipa-client-install might enable credential caching, and should be used with care.