Dear Gary, Lukas, Many Thanks. I just submitted this issue on bugzilla for Fedora. https://bugzilla.redhat.com/show_bug.cgi?id=1432055 After I install RHEL7.3(because I tested it on CentOS7), I'll submit it on RHEL also. Kind Regards, OMO 2017-03-14 20:20 GMT+09:00 Lukas Vrabec <lvrabec@xxxxxxxxxx>: > On 03/14/2017 11:39 AM, Gary Tierney wrote: >> >> On Tue, Mar 14, 2017 at 12:24:32PM +0900, 面和毅 wrote: >>> >>> Hi list, >>> >>> I just found strange behavior on tomcat_t. >>> (I checked Fedora25, CentOS7). >>> >>> During PoC for CVE-2017-5638(I know RedHat products are >>> not affected, just wanted to confirm SELinux behavior), >>> I found that tomcat_t can read shadow_t file, access to >>> admin_home_t directory, and so on. >>> >>> I guess there is a suitable reason to allow those permission >>> to tomcat_t, but I just want to confirm the reason. >>> >>> ----- Quick test for tomcat_t -----; >>> I did just temporary test for checking tomcat_t behavior >>> on Fedora25. >>> >>> 1. I copied /bin/bash to /root/tomcat_shell.sh, and assigned >>> context as "tomcat_exec_t". >>> >>> [root@fedora25 ~]# ls -lZ /root/tomcat_shell.sh >>> -rwxr-xr-x. 1 root root system_u:object_r:tomcat_exec_t:s0 >>> 1072008 Mar 14 11:53 /root/tomcat_shell.sh >>> >>> 2. I added some cil policy just for this test. >>> [root@fedora25 ~]# cat tomcat_sh.cil >>> (typeattributeset entry_type tomcat_exec_t) >>> (roletype unconfined_r tomcat_t) >>> (typetransition unconfined_t tomcat_exec_t process tomcat_t) >>> >>> 3. load above module, and run tomcat_shell.sh >>> [root@fedora25 ~]# semodule -i tomcat_sh.cil >>> [root@fedora25 ~]# ./tomcat_shell.sh >>> [root@fedora25 ~]# id -Z >>> unconfined_u:unconfined_r:tomcat_t:s0-s0:c0.c1023 >>> >>> 4. access to shadow file, /root/ file, etc. >>> [root@fedora25 ~]# cat /etc/shadow >>> root:$6$h0wd.::0:99999:7::: >>> bin:*:17004:0:99999:7::: >>> daemon:*:17004:0:99999:7::: >>> --snip-- >>> [root@fedora25 ~]# cat /root/tomcat_sh.cil >>> (typeattributeset entry_type tomcat_exec_t) >>> (roletype unconfined_r tomcat_t) >>> (typetransition unconfined_t tomcat_exec_t process tomcat_t) >>> [root@fedora25 ~]# ls -lZ /root/tomcat_sh.cil >>> -rw-r--r--. 1 root root unconfined_u:object_r:admin_home_t:s0 >>> 138 Mar 14 12:01 /root/tomcat_sh.cil >>> ----- End ----- >>> >>> So, can I ask the reason why we add these permission to tomcat_t? >> >> > > There is no reason to have tomcat_t domain in uconfined_domain. > > >> These permissions aren't directly added to tomcat, they come from tomcat >> being an unconfined domain: >> >> https://github.com/fedora-selinux/selinux-policy-contrib/blob/f25/tomcat.te#L21 >> >> $ sesearch -ACS -s tomcat_t -t shadow_t -c file -p read >> Found 1 semantic av rules: >> allow files_unconfined_type file_type : file { ioctl read write create >> getattr setattr lock relabelfrom relabelto append unlink link rename execute >> swapon quotaon mounton execute_no_trans open audit_access } ; >> >> $ seinfo -ttomcat_t -x >> tomcat_t >> can_read_shadow_passwords >> can_write_shadow_passwords >> can_relabelto_shadow_passwords >> can_change_object_identity >> can_load_kernmodule >> can_load_policy >> can_setbool >> can_setenforce >> corenet_unconfined_type >> corenet_unlabeled_type >> devices_unconfined_type >> domain >> files_unconfined_type >> filesystem_unconfined_type >> kern_unconfined >> kernel_system_state_reader >> process_uncond_exempt >> selinux_unconfined_type >> storage_unconfined_type >> unconfined_domain_type >> dbusd_unconfined >> daemon >> syslog_client_type >> sepgsql_unconfined_type >> tomcat_domain >> userdom_filetrans_type >> x_domain >> xserver_unconfined_type >> >> I don't see why Tomcat would need to be an unconfined domain, though. >> > > tomcat_t is in unconfined_domain_type attribute in Fedora 25 and Centos7. > This looks like bug when tomcat policy was written. > > Could you please submit bug for Fedora and also RHEL? It should be fixed. > > Lukas. > >>> >>> Kind Regards, >>> >>> OMO >>> >>> >>> -- >>> Kazuki Omo: ka-omo@xxxxxxxx >>> OSS &Security Evangelist >>> OSS Business Planning Dept. >>> CISSP #366942 >>> http://www.secureoss.jp/ >>> Tel: +819026581386 >>> _______________________________________________ >>> Selinux mailing list >>> Selinux@xxxxxxxxxxxxx >>> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. >>> To get help, send an email containing "help" to >>> Selinux-request@xxxxxxxxxxxxx. >> >> >> >> >> _______________________________________________ >> Selinux mailing list >> Selinux@xxxxxxxxxxxxx >> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. >> To get help, send an email containing "help" to >> Selinux-request@xxxxxxxxxxxxx. >> > > > -- > Lukas Vrabec > SELinux Solutions > Red Hat, Inc. > > _______________________________________________ > Selinux mailing list > Selinux@xxxxxxxxxxxxx > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. > To get help, send an email containing "help" to > Selinux-request@xxxxxxxxxxxxx. -- Kazuki Omo: ka-omo@xxxxxxxx OSS &Security Evangelist OSS Business Planning Dept. CISSP #366942 Tel: +81364015149 _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.