Bootstrap token persists on disk with weak file permissions #59
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Info
Severity: HIGH
Attack vector: local malicious process
Impact
Allows a local attacker to steal the bootstrap token, register a malicious user agent, and potentially take permanent control of the vault bootstrap flow.
Description
The bootstrap token is written to
~/.arbiter/bootstrap_tokenusing default file permissions and is never deleted after successful consumption. That leaves the token readable to other local processes running under the same UID, and possibly to other users depending on directory permissions. It also leaves a long-lived sensitive artifact on disk even after bootstrap is complete.Example flow
~/.arbiter/bootstrap_tokenfrom disk before or after legitimate bootstrap.Mitigation
Create the file with mode
0o600and delete it immediately after successful token consumption.