[libvirt] security: the qemu agent command "guest-exec" may cause Insider Access

Peter Krempa pkrempa at redhat.com
Fri Aug 25 07:24:43 UTC 2017


On Fri, Aug 25, 2017 at 06:45:18 +0000, Zhangbo (Oscar) wrote:
> Hi all:
>      The Host Administrator is capable of running any exec in guests via the qemu-ga command "guest-exec", eg:
> 
>         virsh qemu-agent-command test_guest '{"execute": "guest-exec", "arguments": {"path": "ifconfig", "arg": [ "eth1", "192.168.0.99" ],"capture-output": true } }'
> {"return":{"pid":12425}}
>        virsh qemu-agent-command test_guest '{"execute": "guest-exec-status", "arguments": { "pid": 12425 } }'
> {"return":{"exitcode":0,"exited":true}}
> 
>       The example above just change the guests' ip address, the Administrator may also change guests' user password, get sensitive information, etc. which causes Insider Access.
>       The Administrator also can use other commands such as " guest-file-open" that also cause Insider Access.
> 
>       So, how to avoid this security problem, what's your suggestion?

You can use the "--blacklist" facility of qemu-ga to disable APIs you
don't want to support. Or don't run the guest agent at all.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/libvir-list/attachments/20170825/86013818/attachment-0001.sig>


More information about the libvir-list mailing list