Skip to content

Log Information Disclosure

Moderate
darksidemilk published GHSA-697m-3c4p-g29h Aug 2, 2024

Package

FOG

Affected versions

<1.5.10.47

Patched versions

>=1.5.10.47

Description

Summary

FOG Server 1.5.10.41.4 can leak authorized and rejected logins via logs stored directly on the root of the web server.

Details

FOG Server creates 2 logs on the root of the web server (fog_login_accepted.log and fog_login_failed.log), exposing the name of the user account used to manage FOG, the IP address of the computer used to login and the User-Agent.

PoC

[08-02-24 5:23:48 pm] - 192.168.0.42 - Mozilla/5.0 (Windows NT 10.0; rv:113.0) Gecko/20100101 Firefox/113.0 - Login accepted - username: fog logged in
[08-02-24 5:24:50 pm] - 192.168.0.42 - Mozilla/5.0 (Windows NT 10.0; rv:113.0) Gecko/20100101 Firefox/113.0 - Login accepted - username: fog logged in

or

[08-02-24 5:24:27 pm] - 192.168.0.42 - Mozilla/5.0 (Windows NT 10.0; rv:113.0) Gecko/20100101 Firefox/113.0 - Login failed - username: admin failed to login
[08-02-24 5:24:38 pm] - 192.168.0.42 - Mozilla/5.0 (Windows NT 10.0; rv:113.0) Gecko/20100101 Firefox/113.0 - Login failed - username: demo failed to login

Impact

All administrators managing FOG Server

Fast patch :

#!/bin/bash
source /opt/fog/.fogsettings

if [[ -z "${docroot}${webroot}" ]]; then
	echo "Error: no FOG installation detected on this server."
	exit 1
fi
touch "${docroot}${webroot}fog_login_accepted.log"
touch "${docroot}${webroot}fog_login_failed.log"
chmod 0200 "${docroot}${webroot}fog_login_accepted.log"
chmod 0200 "${docroot}${webroot}fog_login_failed.log"
chown www-data:www-data "${docroot}${webroot}fog_login_accepted.log"
chown www-data:www-data "${docroot}${webroot}fog_login_failed.log"

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE ID

CVE-2024-42349

Weaknesses

No CWEs

Credits