RSA Identity Governance & Lifecycle Malicious Code Execution by root Vulnerability
Originally Published: 2018-05-02
Article Number
Applies To
| RSA Product Name | Versions | Platforms |
|---|---|---|
| RSA Identity Governance & Lifecycle | 7.1 P01 and earlier | RSA hardware appliance Virtual application (OVA) with RSA-provided database Virtual application (OVA) with customer-supplied database Software Bundle with RSA database Software Bundle for Customer Supplied Database |
| RSA Identity Governance & Lifecycle | 7.0.2 P07 and earlier 7.0.1 | RSA hardware appliance Software Bundle (also known as Soft-Appliance) with RSA database Software Bundle (also known as Soft-Appliance) for Customer Supplied Database |
| RSA Via Lifecycle & Governance | 7.0 | RSA hardware appliance Software Bundle (also known as Soft-Appliance) with RSA database Software Bundle (also known as Soft-Appliance) for Customer Supplied Database |
CVE Identifier(s)
Article Summary
Alert Impact
Impacted - Apply RSA Remedy
Alert Impact Explanation
Status of any 'dot (. or :. or .: )' entries within the 'root user's $PATH' variable
Presence of a dot in the $PATH variable for the 'root' user will cause a binary in the current directory to be preferentially executed over other, originally desired, system binaries of the same name. Therefore, adding the ':.' (colon + dot) to the root $PATH can cause execution of malicious code as the root user. For example, if the administrator were to log in as root and switch to a directory that had a file called cd within it and that file contained the text rm -rf this command would act in place of the original system cd command and wipe out the contents to the target directory.
Resolution
- Login to the appliance as root
- Use the three commands below to backup the files that will be changed. Each command should return no output and no errors:
mkdir /tmp/ACM-83000-backup
cd ${AVEKSA_HOME}/deploy
cp -t /tmp/ACM-83000-backup /root/setDeployEnv.sh upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
- Run only one of the following commands, based on your current RSA product version. No output or errors should be returned:
| Product Version | Output |
|---|---|
| v7.1.0 P01 and earlier |
sed -i 's/export PATH=".:/export PATH="/' /root/setDeployEnv.sh |
| v7.0.2 P07 and earlier v7.0.1 v7.0 |
sed -i 's/export PATH=.:/export PATH=/' /root/setDeployEnv.sh |
- While still in the ${AVEKSA_HOME}/deploy directory, run the following command. It should return no output and no errors:
sed -i 's_#!/bin/sh_#!/bin/bash_' upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
- While still in the ${AVEKSA_HOME}/deploy directory, run the following command to check if the dot has been removed from the PATH statement in /root/setDeployEnv.sh:
grep 'export PATH=' /root/setDeployEnv.sh
The command should display output as shown in the table below, according to the RSA product version:
| Product Version | Output |
|---|---|
| v7.1.0 P01 and earlier |
export PATH="${ORACLE_HOME}/bin:$PATH"
export PATH="${ORACLE_CLIENT_HOME}:$PATH"
export PATH="${JAVA_HOME}/bin:$PATH"
|
| v7.0.2 P07 and earlier v7.0.1 v7.0 |
export PATH=$ORACLE_HOME/bin:$ORACLE_CLIENT_HOME:$JAVA_HOME/bin:$PATH |
- While still in the ${AVEKSA_HOME}/deploy directory, use the following command to check if the shell has been changed for the specified script files:
grep -n '#!/bin/bash' upgrade_utils.sh upgradeDB.sh generateLoginKey.sh oracle/dboraAbort.sh ${AVEKSA_HOME}/database/cliAveksa.sh
The command should display the following output:
upgrade_utils.sh:1:#!/bin/bash upgradeDB.sh:1:#!/bin/bash generateLoginKey.sh:1:#!/bin/bash oracle/dboraAbort.sh:1:#!/bin/bash /home/oracle/database/cliAveksa.sh:1:#!/bin/bash
Notes
Backout
Should you need to backout these changes, the original files can be copied from the backup directory to their original locations as follows:- Login to the appliance as root
- Run the following commands:
cp /tmp/ACM-83000-backup/setDeployEnv.sh /root
cp /tmp/ACM-83000-backup/dboraAbort.sh ${AVEKSA_HOME}/deploy/oracle
cp /tmp/ACM-83000-backup/cliAveksa.sh ${AVEKSA_HOME}/database
cp /tmp/ACM-83000-backup/{upgrade_utils.sh,upgradeDB.sh,generateLoginKey.sh} ${AVEKSA_HOME}/deployDisclaimer
Related Articles
How to su as root to a user account protected by securid without getting Passcode prompted. 31Number of Views WorkPoint.log and heap dumps are written to the Linux root directory ( / ) on WebSphere and WebLogic implementations of RS… 145Number of Views Apache Struts 2 Remote Code Execution Vulnerability (CVE-2018-11776): Impact on RSA products 143Number of Views Apache Struts 2 Freemarker Remote Code Execution Vulnerability (CVE-2017-12611) in RSA Products 170Number of Views RSA Identity Governance & Lifecycle Security Vulnerability for Operating System SLES 11 SP3 - False Positive 64Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?