Vulnerabilites related to OpenStack - OpenStack
cve-2022-38060
Vulnerability from cvelistv5
Published
2022-12-21 23:14
Modified
2024-09-16 21:08
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T10:45:52.195Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589", tags: [ "x_transferred", ], url: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "OpenStack", vendor: "OpenStack", versions: [ { status: "affected", version: "git master 05194e7618", }, ], }, ], descriptions: [ { lang: "en", value: "A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269: Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-01T16:59:01.801Z", orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", shortName: "talos", }, references: [ { name: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589", url: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589", }, ], }, }, cveMetadata: { assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", assignerShortName: "talos", cveId: "CVE-2022-38060", datePublished: "2022-12-21T23:14:33.786205Z", dateReserved: "2022-08-10T00:00:00", dateUpdated: "2024-09-16T21:08:57.753Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-38065
Vulnerability from cvelistv5
Published
2022-12-21 23:14
Modified
2024-09-17 00:02
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T10:45:52.535Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "OpenStack", vendor: "OpenStack", versions: [ { status: "affected", version: "git master 05194e7618", }, ], }, ], datePublic: "2022-12-20T00:00:00", descriptions: [ { lang: "en", value: "A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269: Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-21T00:00:00", orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", shortName: "talos", }, references: [ { url: "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599", }, ], }, }, cveMetadata: { assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", assignerShortName: "talos", cveId: "CVE-2022-38065", datePublished: "2022-12-21T23:14:33.786205Z", dateReserved: "2022-08-26T00:00:00", dateUpdated: "2024-09-17T00:02:04.944Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12440
Vulnerability from cvelistv5
Published
2017-08-18 14:00
Modified
2024-08-05 18:36
Severity ?
EPSS score ?
Summary
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/ossn/+bug/1649333 | x_refsource_CONFIRM | |
https://review.openstack.org/#/c/493826/ | x_refsource_CONFIRM | |
https://review.openstack.org/#/c/493823/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100455 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3953 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2017:3227 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2018:0315 | vendor-advisory, x_refsource_REDHAT | |
https://review.openstack.org/#/c/493824/ | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:36:56.113Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.launchpad.net/ossn/+bug/1649333", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://review.openstack.org/#/c/493826/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://review.openstack.org/#/c/493823/", }, { name: "100455", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100455", }, { name: "DSA-3953", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3953", }, { name: "RHSA-2017:3227", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:3227", }, { name: "RHSA-2018:0315", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:0315", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://review.openstack.org/#/c/493824/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-12-12T00:00:00", descriptions: [ { lang: "en", value: "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-14T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.launchpad.net/ossn/+bug/1649333", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://review.openstack.org/#/c/493826/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://review.openstack.org/#/c/493823/", }, { name: "100455", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100455", }, { name: "DSA-3953", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3953", }, { name: "RHSA-2017:3227", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:3227", }, { name: "RHSA-2018:0315", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:0315", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://review.openstack.org/#/c/493824/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-12440", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.launchpad.net/ossn/+bug/1649333", refsource: "CONFIRM", url: "https://bugs.launchpad.net/ossn/+bug/1649333", }, { name: "https://review.openstack.org/#/c/493826/", refsource: "CONFIRM", url: "https://review.openstack.org/#/c/493826/", }, { name: "https://review.openstack.org/#/c/493823/", refsource: "CONFIRM", url: "https://review.openstack.org/#/c/493823/", }, { name: "100455", refsource: "BID", url: "http://www.securityfocus.com/bid/100455", }, { name: "DSA-3953", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3953", }, { name: "RHSA-2017:3227", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:3227", }, { name: "RHSA-2018:0315", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:0315", }, { name: "https://review.openstack.org/#/c/493824/", refsource: "CONFIRM", url: "https://review.openstack.org/#/c/493824/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-12440", datePublished: "2017-08-18T14:00:00", dateReserved: "2017-08-04T00:00:00", dateUpdated: "2024-08-05T18:36:56.113Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2017-08-18 14:29
Modified
2024-11-21 03:09
Severity ?
Summary
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openstack:openstack:07132017:*:*:*:*:*:*:*", matchCriteriaId: "A918C7A9-B922-41FA-9B3E-08F66454B41F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", }, { lang: "es", value: "Aodh, tal y como viene en Openstack Ocata y Newton antes de change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 y antes de Pike-rc1, no verifica que las ID de confianza pertenecen al usuario cuando se crean acciones de alarma con el esquema \"trust+http\", lo que permite a los usuarios autenticados remotos con conocimiento sobre las ID de confianza en donde Aodh es la entidad de confianza obtener un token Keystone y realizar acciones autenticadas no especificadas añadiendo una acción de alarma con el esquema \"trust+http\" y proporcionando una ID de confianza en donde Aodh es la entidad de confianza.", }, ], id: "CVE-2017-12440", lastModified: "2024-11-21T03:09:29.210", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-08-18T14:29:00.377", references: [ { source: "cve@mitre.org", url: "http://www.debian.org/security/2017/dsa-3953", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100455", }, { source: "cve@mitre.org", url: "https://access.redhat.com/errata/RHSA-2017:3227", }, { source: "cve@mitre.org", url: "https://access.redhat.com/errata/RHSA-2018:0315", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.launchpad.net/ossn/+bug/1649333", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493823/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493824/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493826/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3953", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100455", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2017:3227", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2018:0315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.launchpad.net/ossn/+bug/1649333", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493823/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493824/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://review.openstack.org/#/c/493826/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-306", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }