Re: tomcat_t domain behavior

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dear Gary, Lukas,

Many Thanks.

I just submitted this issue on bugzilla for Fedora.
https://bugzilla.redhat.com/show_bug.cgi?id=1432055

After I install RHEL7.3(because I tested it on CentOS7), I'll submit
it on RHEL also.

Kind Regards,

OMO

2017-03-14 20:20 GMT+09:00 Lukas Vrabec <lvrabec@xxxxxxxxxx>:
> On 03/14/2017 11:39 AM, Gary Tierney wrote:
>>
>> On Tue, Mar 14, 2017 at 12:24:32PM +0900, 面和毅 wrote:
>>>
>>> Hi list,
>>>
>>> I just found strange behavior on tomcat_t.
>>> (I checked Fedora25, CentOS7).
>>>
>>> During PoC for CVE-2017-5638(I know RedHat products are
>>> not affected, just wanted to confirm SELinux behavior),
>>> I found that tomcat_t can read shadow_t file, access to
>>> admin_home_t directory, and so on.
>>>
>>> I guess there is a suitable reason to allow those permission
>>> to tomcat_t, but I just want to confirm the reason.
>>>
>>> ----- Quick test for tomcat_t -----;
>>> I did just temporary test for checking tomcat_t behavior
>>> on Fedora25.
>>>
>>> 1. I copied /bin/bash to /root/tomcat_shell.sh, and assigned
>>>    context as "tomcat_exec_t".
>>>
>>> [root@fedora25 ~]# ls -lZ /root/tomcat_shell.sh
>>> -rwxr-xr-x. 1 root root system_u:object_r:tomcat_exec_t:s0
>>> 1072008 Mar 14 11:53 /root/tomcat_shell.sh
>>>
>>> 2. I added some cil policy just for this test.
>>> [root@fedora25 ~]# cat tomcat_sh.cil
>>> (typeattributeset entry_type tomcat_exec_t)
>>> (roletype unconfined_r tomcat_t)
>>> (typetransition unconfined_t tomcat_exec_t process tomcat_t)
>>>
>>> 3. load above module, and run tomcat_shell.sh
>>> [root@fedora25 ~]# semodule -i tomcat_sh.cil
>>> [root@fedora25 ~]# ./tomcat_shell.sh
>>> [root@fedora25 ~]# id -Z
>>> unconfined_u:unconfined_r:tomcat_t:s0-s0:c0.c1023
>>>
>>> 4. access to shadow file, /root/ file, etc.
>>> [root@fedora25 ~]# cat /etc/shadow
>>> root:$6$h0wd.::0:99999:7:::
>>> bin:*:17004:0:99999:7:::
>>> daemon:*:17004:0:99999:7:::
>>> --snip--
>>> [root@fedora25 ~]# cat /root/tomcat_sh.cil
>>> (typeattributeset entry_type tomcat_exec_t)
>>> (roletype unconfined_r tomcat_t)
>>> (typetransition unconfined_t tomcat_exec_t process tomcat_t)
>>> [root@fedora25 ~]# ls -lZ /root/tomcat_sh.cil
>>> -rw-r--r--. 1 root root unconfined_u:object_r:admin_home_t:s0
>>> 138 Mar 14 12:01 /root/tomcat_sh.cil
>>> ----- End -----
>>>
>>> So, can I ask the reason why we add these permission to tomcat_t?
>>
>>
>
> There is no reason to have tomcat_t domain in uconfined_domain.
>
>
>> These permissions aren't directly added to tomcat, they come from tomcat
>> being an unconfined domain:
>>
>> https://github.com/fedora-selinux/selinux-policy-contrib/blob/f25/tomcat.te#L21
>>
>> $ sesearch -ACS -s tomcat_t -t shadow_t -c file -p read
>> Found 1 semantic av rules:
>>    allow files_unconfined_type file_type : file { ioctl read write create
>> getattr setattr lock relabelfrom relabelto append unlink link rename execute
>> swapon quotaon mounton execute_no_trans open audit_access } ;
>>
>> $ seinfo -ttomcat_t -x
>>    tomcat_t
>>       can_read_shadow_passwords
>>       can_write_shadow_passwords
>>       can_relabelto_shadow_passwords
>>       can_change_object_identity
>>       can_load_kernmodule
>>       can_load_policy
>>       can_setbool
>>       can_setenforce
>>       corenet_unconfined_type
>>       corenet_unlabeled_type
>>       devices_unconfined_type
>>       domain
>>       files_unconfined_type
>>       filesystem_unconfined_type
>>       kern_unconfined
>>       kernel_system_state_reader
>>       process_uncond_exempt
>>       selinux_unconfined_type
>>       storage_unconfined_type
>>       unconfined_domain_type
>>       dbusd_unconfined
>>       daemon
>>       syslog_client_type
>>       sepgsql_unconfined_type
>>       tomcat_domain
>>       userdom_filetrans_type
>>       x_domain
>>       xserver_unconfined_type
>>
>> I don't see why Tomcat would need to be an unconfined domain, though.
>>
>
> tomcat_t is in unconfined_domain_type attribute in Fedora 25 and Centos7.
> This looks like bug when tomcat policy was written.
>
> Could you please submit bug for Fedora and also RHEL? It should be fixed.
>
> Lukas.
>
>>>
>>> Kind Regards,
>>>
>>> OMO
>>>
>>>
>>> --
>>> Kazuki Omo: ka-omo@xxxxxxxx
>>> OSS &Security Evangelist
>>> OSS Business Planning Dept.
>>> CISSP #366942
>>> http://www.secureoss.jp/
>>> Tel: +819026581386
>>> _______________________________________________
>>> Selinux mailing list
>>> Selinux@xxxxxxxxxxxxx
>>> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
>>> To get help, send an email containing "help" to
>>> Selinux-request@xxxxxxxxxxxxx.
>>
>>
>>
>>
>> _______________________________________________
>> Selinux mailing list
>> Selinux@xxxxxxxxxxxxx
>> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
>> To get help, send an email containing "help" to
>> Selinux-request@xxxxxxxxxxxxx.
>>
>
>
> --
> Lukas Vrabec
> SELinux Solutions
> Red Hat, Inc.
>
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to
> Selinux-request@xxxxxxxxxxxxx.



-- 
Kazuki Omo: ka-omo@xxxxxxxx
OSS &Security Evangelist
OSS Business Planning Dept.
CISSP #366942
Tel: +81364015149

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux