On Tue, Mar 14, 2017 at 12:24:32PM +0900, 面和毅 wrote: > Hi list, > > I just found strange behavior on tomcat_t. > (I checked Fedora25, CentOS7). > > During PoC for CVE-2017-5638(I know RedHat products are > not affected, just wanted to confirm SELinux behavior), > I found that tomcat_t can read shadow_t file, access to > admin_home_t directory, and so on. > > I guess there is a suitable reason to allow those permission > to tomcat_t, but I just want to confirm the reason. > > ----- Quick test for tomcat_t -----; > I did just temporary test for checking tomcat_t behavior > on Fedora25. > > 1. I copied /bin/bash to /root/tomcat_shell.sh, and assigned > context as "tomcat_exec_t". > > [root@fedora25 ~]# ls -lZ /root/tomcat_shell.sh > -rwxr-xr-x. 1 root root system_u:object_r:tomcat_exec_t:s0 > 1072008 Mar 14 11:53 /root/tomcat_shell.sh > > 2. I added some cil policy just for this test. > [root@fedora25 ~]# cat tomcat_sh.cil > (typeattributeset entry_type tomcat_exec_t) > (roletype unconfined_r tomcat_t) > (typetransition unconfined_t tomcat_exec_t process tomcat_t) > > 3. load above module, and run tomcat_shell.sh > [root@fedora25 ~]# semodule -i tomcat_sh.cil > [root@fedora25 ~]# ./tomcat_shell.sh > [root@fedora25 ~]# id -Z > unconfined_u:unconfined_r:tomcat_t:s0-s0:c0.c1023 > > 4. access to shadow file, /root/ file, etc. > [root@fedora25 ~]# cat /etc/shadow > root:$6$h0wd.::0:99999:7::: > bin:*:17004:0:99999:7::: > daemon:*:17004:0:99999:7::: > --snip-- > [root@fedora25 ~]# cat /root/tomcat_sh.cil > (typeattributeset entry_type tomcat_exec_t) > (roletype unconfined_r tomcat_t) > (typetransition unconfined_t tomcat_exec_t process tomcat_t) > [root@fedora25 ~]# ls -lZ /root/tomcat_sh.cil > -rw-r--r--. 1 root root unconfined_u:object_r:admin_home_t:s0 > 138 Mar 14 12:01 /root/tomcat_sh.cil > ----- End ----- > > So, can I ask the reason why we add these permission to tomcat_t? These permissions aren't directly added to tomcat, they come from tomcat being an unconfined domain: https://github.com/fedora-selinux/selinux-policy-contrib/blob/f25/tomcat.te#L21 $ sesearch -ACS -s tomcat_t -t shadow_t -c file -p read Found 1 semantic av rules: allow files_unconfined_type file_type : file { ioctl read write create getattr setattr lock relabelfrom relabelto append unlink link rename execute swapon quotaon mounton execute_no_trans open audit_access } ; $ seinfo -ttomcat_t -x tomcat_t can_read_shadow_passwords can_write_shadow_passwords can_relabelto_shadow_passwords can_change_object_identity can_load_kernmodule can_load_policy can_setbool can_setenforce corenet_unconfined_type corenet_unlabeled_type devices_unconfined_type domain files_unconfined_type filesystem_unconfined_type kern_unconfined kernel_system_state_reader process_uncond_exempt selinux_unconfined_type storage_unconfined_type unconfined_domain_type dbusd_unconfined daemon syslog_client_type sepgsql_unconfined_type tomcat_domain userdom_filetrans_type x_domain xserver_unconfined_type I don't see why Tomcat would need to be an unconfined domain, though. > > Kind Regards, > > OMO > > > -- > Kazuki Omo: ka-omo@xxxxxxxx > OSS &Security Evangelist > OSS Business Planning Dept. > CISSP #366942 > http://www.secureoss.jp/ > Tel: +819026581386 > _______________________________________________ > Selinux mailing list > Selinux@xxxxxxxxxxxxx > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. > To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx. -- Gary Tierney GPG fingerprint: 412C 0EF9 C305 68E6 B660 BDAF 706E D765 85AA 79D8 https://sks-keyservers.net/pks/lookup?op=get&search=0x706ED76585AA79D8
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.