RSA Identity Governance & Lifecycle Malicious Code Execution by root Vulnerability
Originally Published: 2018-05-02
Article Number
Applies To
| RSA Product Name | Versions | Platforms |
|---|---|---|
| RSA Identity Governance & Lifecycle | 7.1 P01 and earlier | RSA hardware appliance Virtual application (OVA) with RSA-provided database Virtual application (OVA) with customer-supplied database Software Bundle with RSA database Software Bundle for Customer Supplied Database |
| RSA Identity Governance & Lifecycle | 7.0.2 P07 and earlier 7.0.1 | RSA hardware appliance Software Bundle (also known as Soft-Appliance) with RSA database Software Bundle (also known as Soft-Appliance) for Customer Supplied Database |
| RSA Via Lifecycle & Governance | 7.0 | RSA hardware appliance Software Bundle (also known as Soft-Appliance) with RSA database Software Bundle (also known as Soft-Appliance) for Customer Supplied Database |
CVE Identifier(s)
Article Summary
Alert Impact
Impacted - Apply RSA Remedy
Alert Impact Explanation
Status of any 'dot (. or :. or .: )' entries within the 'root user's $PATH' variable
Presence of a dot in the $PATH variable for the 'root' user will cause a binary in the current directory to be preferentially executed over other, originally desired, system binaries of the same name. Therefore, adding the ':.' (colon + dot) to the root $PATH can cause execution of malicious code as the root user. For example, if the administrator were to log in as root and switch to a directory that had a file called cd within it and that file contained the text rm -rf this command would act in place of the original system cd command and wipe out the contents to the target directory.
Resolution
- Login to the appliance as root
- Use the three commands below to backup the files that will be changed. Each command should return no output and no errors:
mkdir /tmp/ACM-83000-backup
cd ${AVEKSA_HOME}/deploy
cp -t /tmp/ACM-83000-backup /root/setDeployEnv.sh upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
- Run only one of the following commands, based on your current RSA product version. No output or errors should be returned:
| Product Version | Output |
|---|---|
| v7.1.0 P01 and earlier |
sed -i 's/export PATH=".:/export PATH="/' /root/setDeployEnv.sh |
| v7.0.2 P07 and earlier v7.0.1 v7.0 |
sed -i 's/export PATH=.:/export PATH=/' /root/setDeployEnv.sh |
- While still in the ${AVEKSA_HOME}/deploy directory, run the following command. It should return no output and no errors:
sed -i 's_#!/bin/sh_#!/bin/bash_' upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
- While still in the ${AVEKSA_HOME}/deploy directory, run the following command to check if the dot has been removed from the PATH statement in /root/setDeployEnv.sh:
grep 'export PATH=' /root/setDeployEnv.sh
The command should display output as shown in the table below, according to the RSA product version:
| Product Version | Output |
|---|---|
| v7.1.0 P01 and earlier |
export PATH="${ORACLE_HOME}/bin:$PATH"
export PATH="${ORACLE_CLIENT_HOME}:$PATH"
export PATH="${JAVA_HOME}/bin:$PATH"
|
| v7.0.2 P07 and earlier v7.0.1 v7.0 |
export PATH=$ORACLE_HOME/bin:$ORACLE_CLIENT_HOME:$JAVA_HOME/bin:$PATH |
- While still in the ${AVEKSA_HOME}/deploy directory, use the following command to check if the shell has been changed for the specified script files:
grep -n '#!/bin/bash' upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
The command should display the following output:
upgrade_utils.sh:1:#!/bin/bash upgradeDB.sh:1:#!/bin/bash generateLoginKey.sh:1:#!/bin/bash oracle/dboraAbort.sh:1:#!/bin/bash /home/oracle/database/cliAveksa.sh:1:#!/bin/bash
Notes
Backout
Should you need to backout these changes, the original files can be copied from the backup directory to their original locations as follows:- Login to the appliance as root
- Run the following commands:
cp /tmp/ACM-83000-backup/setDeployEnv.sh /root
cp /tmp/ACM-83000-backup/dboraAbort.sh ${AVEKSA_HOME}/deploy/oracle
cp /tmp/ACM-83000-backup/cliAveksa.sh ${AVEKSA_HOME}/database
cp /tmp/ACM-83000-backup/{upgrade_utils.sh,upgradeDB.sh,generateLoginKey.sh} ${AVEKSA_HOME}/deployDisclaimer
Related Articles
WorkPoint.log and heap dumps are written to the Linux root directory ( / ) on WebSphere and WebLogic implementations of RS… 145Number of Views How to log a request for enhancement (RFE) for RSA Identity Governance & Lifecycle 295Number of Views Salesforce AFX Connector provisioning fails with 'Error occured while generating access token from refresh token' and INV… 281Number of Views FAQ for finding information about the RSA Identity Governance & Lifecycle application 233Number of Views RSA Authentication Manager 8.8 VMware Virtual Appliance Getting Started 69Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?