#VU11464 Security restrictions bypass in Red Hat OpenStack


Published: 2018-03-28 | Updated: 2018-04-02

Vulnerability identifier: #VU11464

Vulnerability risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12155

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Red Hat OpenStack
Server applications / Other server solutions

Vendor: Red Hat Inc.

Description
The vulnerability allows a local attacker to bypass security restriction on the target system.

The weakness exists due to resource-permission flaw in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key can bypass security restrcions and read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Red Hat OpenStack: 12


External links
http://access.redhat.com/errata/RHSA-2018:0602
http://access.redhat.com/security/cve/cve-2017-12155


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability