Date: Sat, 16 Aug 2014 20:12:15 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com, cve-assign@...re.org, security@...enas.org Subject: FreeNAS default blank password So I installed the latest FreeNAS (22.214.171.124), install is simple, no options, it just drops it onto the disk you specify, you reboot, it works. By default you get a text based menu with some options (setup network/DNS/etc.), and one option is "Reset WebGUI Login Credentials". The problem is at first boot (and if you ever pick "Reset WebGUI Login Credentials") the web admin has a blank password, anyone that can access it can set the admin password and then use the web GUI to fire up a root shell (there's a nice little web shell command line). So an attacker can easily race the admin to the WebGUI, set a new password, login as root, setup a backdoor, then reset the WebGUI password so it's blank again and the admin would be none the wiser (log files won't help because the attacker has root can can easily sanitize them). There is no way from the text GUI to set the Web GUI admin password. I don't think there is even a CLI tool to set the web GUI password (I can't find it easily). Either way, does this deserve a CVE? Forcing a user to set the admin Web GUI password through the Web GUI, meaning it must be exposed to some degree prior to securing it. My understanding is default/blank admin credentials now == CVE. Thanks. -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.