Security restrictions bypass in Red Hat OpenStack - CVE-2017-2673
Published: June 30, 2017
Vulnerability identifier: #VU7271
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-2673
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat OpenStack
Red Hat OpenStack
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to bypass security restrictions.
The weakness exists due to improper security restrictions imposed by the affected software. A remote attacker can request project permissions and receive permissions for all roles for the project to conduct further attacks.
Successful exploitation of the vulnerability results in unauthorized access to the system.
The weakness exists due to improper security restrictions imposed by the affected software. A remote attacker can request project permissions and receive permissions for all roles for the project to conduct further attacks.
Successful exploitation of the vulnerability results in unauthorized access to the system.
How to mitigate CVE-2017-2673
Install update from vendor's website.