Security restrictions bypass in Red Hat OpenStack



Published: 2017-09-19 | Updated: 2018-04-02
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12155
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Red Hat OpenStack
Server applications / Other server solutions

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU11464

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12155

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass security restriction on the target system.

The weakness exists due to resource-permission flaw in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key can bypass security restrcions and read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Red Hat OpenStack: 12

External links

http://access.redhat.com/errata/RHSA-2018:0602
http://access.redhat.com/security/cve/cve-2017-12155


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###