Security restrictions bypass in Red Hat OpenStack - CVE-2017-12155
Published: March 28, 2018 / Updated: April 2, 2018
Vulnerability identifier: #VU11464
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12155
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat OpenStack
Red Hat OpenStack
Detailed vulnerability description
The vulnerability allows a local attacker to bypass security restriction on the target system.
The weakness exists due to resource-permission flaw in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key can bypass security restrcions and read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
The weakness exists due to resource-permission flaw in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key can bypass security restrcions and read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
How to mitigate CVE-2017-12155
Install update from vendor's website.