Title: Ambari Server 1.7.0 Local Privilege Escalation
Author: Julian Horoszkiewicz
Description:
An issue with ambari-root privilege separation model has been identified.
The reason for this is that /var/lib/ambari-server/ambari-env.sh script is
by default owned by user ambari, but executed as root. That opens the way
for adding arbitrary commands to be executed as root if one has access to
ambari user account.
The ambari server itself runs with…
Title: Hue 3.7.1 Local Privilege Escalation
Author: Julian Horoszkiewicz
Description:
An issue with hue-root privilege separation model has been identified. The
reason for this is that /usr/lib/hue/build/env/bin/supervisor python script
is by default owned by user hue, but executed as root. That opens the way
for adding arbitrary commands to be executed as root if one has access to
hue user account.
The hue server itself runs with privileges of…
I’m honestly surprised it took their team two months to fix this. I’ve
previously reported issues via HackerOne and they were on it within a day.
If anyone else is thinking about whitehatting up Concrete5, you might get a
faster response if you go through the HackerOne platform. Also, they’re
friendly and won’t pull a Daniel Kerr move on you if you tell them their
code is Swiss cheese. Speaking from experience here.
STONIX is an operating system configuration hardening tool for Unix and Unix
like (e.g. Linux) operating systems. This tool implements a hybrid of
guidance from NSA, DISA STIGs, USGCB and the CIS. To as great of a degree as
possible each guidance element for each platform is evaluated on the other
platforms for applicability and applied if possible.