Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2013-6426
Vulnerability from cvelistv5
Published
2013-12-14 17:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "keystone-cve20136426-sec-bypass(89658)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" }, { "name": "RHSA-2014:0090", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "name": "[oss-security] 20131211 [OSSA 2013-034] Heat CFN policy rules not all enforced (CVE-2013-6426)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "name": "64243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64243" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "keystone-cve20136426-sec-bypass(89658)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" }, { "name": "RHSA-2014:0090", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "name": "[oss-security] 20131211 [OSSA 2013-034] Heat CFN policy rules not all enforced (CVE-2013-6426)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "name": "64243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64243" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6426", "datePublished": "2013-12-14T17:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:heat:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2013.2\", \"matchCriteriaId\": \"CA1ACE95-4A57-4550-BC00-ACDA7B593FC5\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.\"}, {\"lang\": \"es\", \"value\": \"El API compatible con CloudFormation en API OpenStack orquestaci\\u00f3n (Heat) antes de Habana 2013.2.1 y anterior a Icehouse Icehouse-2 no aplica correctamente las reglas de pol\\u00edtica, lo que permite a los usuarios locales en la instancia evitar las restricciones de acceso establecidas y, (1) crear una pila a trav\\u00e9s de el m\\u00e9todo CreateStack o, (2) actualizar una pila a trav\\u00e9s del m\\u00e9todo UpdateStack.\"}]", "id": "CVE-2013-6426", "lastModified": "2024-11-21T01:59:12.160", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:P/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-12-14T17:21:47.147", "references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0090.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/12/11/9\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/64243\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugs.launchpad.net/heat/+bug/1256049\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/89658\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0090.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/12/11/9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/64243\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.launchpad.net/heat/+bug/1256049\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/89658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-6426\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-12-14T17:21:47.147\",\"lastModified\":\"2024-11-21T01:59:12.160\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.\"},{\"lang\":\"es\",\"value\":\"El API compatible con CloudFormation en API OpenStack orquestaci\u00f3n (Heat) antes de Habana 2013.2.1 y anterior a Icehouse Icehouse-2 no aplica correctamente las reglas de pol\u00edtica, lo que permite a los usuarios locales en la instancia evitar las restricciones de acceso establecidas y, (1) crear una pila a trav\u00e9s de el m\u00e9todo CreateStack o, (2) actualizar una pila a trav\u00e9s del m\u00e9todo UpdateStack.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:P/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:heat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2013.2\",\"matchCriteriaId\":\"CA1ACE95-4A57-4550-BC00-ACDA7B593FC5\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0090.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/12/11/9\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/64243\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.launchpad.net/heat/+bug/1256049\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/89658\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0090.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/12/11/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/64243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/heat/+bug/1256049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/89658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2014:0090
Vulnerability from csaf_redhat
Published
2014-01-22 18:31
Modified
2024-11-22 07:22
Summary
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
Notes
Topic
Updated openstack-heat packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise Linux
OpenStack Platform 4.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The openstack-heat packages provide heat, a Python implementation of the
OpenStack Orchestration engine, to launch multiple composite cloud
applications based on templates.
It was found that heat did not properly enforce cloudformation-compatible
API policy rules. An in-instance attacker could use the CreateStack or
UpdateStack methods to create or update a stack, resulting in a violation
of the API policy. Note that only setups using Orchestration's
cloudformation-compatible API were affected. (CVE-2013-6426)
A flaw was found in the way Orchestration's REST API implementation handled
modified request paths. An authenticated remote user could use this flaw to
bypass the tenant-scoping restriction by modifying the request path,
resulting in privilege escalation. Note that only setups using
Orchestration's cloudformation-compatible API were affected.
(CVE-2013-6428)
Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting these issues. Upstream acknowledges Steven Hardy of Red Hat as
the original reporter.
The openstack-heat packages have been upgraded to upstream version
2013.2.1, which provides a number of bug fixes and enhancements over the
previous version. The most notable fixes and enhancements are:
- Auto-scaling has been fixed when AdjustmentType was set to
PercentChangeInCapacity.
- A QPID broker restart no longer permanently disrupts subscribed clients.
- RPC requests are now only serviced by one server in a given topic group.
- Auto-scaling group growth or shrinkage has been fixed to utilize the full
available size, regardless of the scaling policy adjustment.
(BZ#1045430)
This update also fixes the following bugs:
* The outdated heat-db-setup tool, which only supported local installs, has
been removed. The Red Hat Enterprise Linux OpenStack Platform 4
Installation and Configuration Guide has been updated to show how to create
the necessary database and associated tables for Orchestration, allowing
the deployment of the database server on a local or remote system (see
Installing the OpenStack Orchestration Service). (BZ#1046326)
* The heat-engine source code had a hard-coded reference to a Fedora image
name in the implementation of the AWS-compatible LoadBalancer resource.
This meant that you could not specify an alternative LoadBalancer image
name in deployments (for example, Red Hat Enterprise Linux). A new option
has been added to the Orchestration configuration file,
/etc/heat/heat.conf, which is named loadbalancer_template. The new
loadbalancer_template option can now be used to specify an alternate
LoadBalancer template that contains a different image name. (BZ#1048215)
* Due to a packaging error, the heat-manage tool was not working properly
(which prohibited a successful database creation). This error has been
fixed by moving the parallel package selection code so that all
Orchestration tools now use the proper packages for use at runtime.
(BZ#1048335)
All openstack-heat users are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-heat packages that fix two security issues, several bugs,\nand add various enhancements are now available for Red Hat Enterprise Linux\nOpenStack Platform 4.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-heat packages provide heat, a Python implementation of the\nOpenStack Orchestration engine, to launch multiple composite cloud\napplications based on templates.\n\nIt was found that heat did not properly enforce cloudformation-compatible\nAPI policy rules. An in-instance attacker could use the CreateStack or\nUpdateStack methods to create or update a stack, resulting in a violation\nof the API policy. Note that only setups using Orchestration\u0027s\ncloudformation-compatible API were affected. (CVE-2013-6426)\n\nA flaw was found in the way Orchestration\u0027s REST API implementation handled\nmodified request paths. An authenticated remote user could use this flaw to\nbypass the tenant-scoping restriction by modifying the request path,\nresulting in privilege escalation. Note that only setups using\nOrchestration\u0027s cloudformation-compatible API were affected.\n(CVE-2013-6428)\n\nRed Hat would like to thank Jeremy Stanley of the OpenStack Project for\nreporting these issues. Upstream acknowledges Steven Hardy of Red Hat as\nthe original reporter.\n\nThe openstack-heat packages have been upgraded to upstream version\n2013.2.1, which provides a number of bug fixes and enhancements over the\nprevious version. The most notable fixes and enhancements are:\n\n- Auto-scaling has been fixed when AdjustmentType was set to\n PercentChangeInCapacity.\n\n- A QPID broker restart no longer permanently disrupts subscribed clients.\n\n- RPC requests are now only serviced by one server in a given topic group.\n\n- Auto-scaling group growth or shrinkage has been fixed to utilize the full\n available size, regardless of the scaling policy adjustment.\n\n(BZ#1045430)\n\nThis update also fixes the following bugs:\n\n* The outdated heat-db-setup tool, which only supported local installs, has\nbeen removed. The Red Hat Enterprise Linux OpenStack Platform 4\nInstallation and Configuration Guide has been updated to show how to create\nthe necessary database and associated tables for Orchestration, allowing\nthe deployment of the database server on a local or remote system (see\nInstalling the OpenStack Orchestration Service). (BZ#1046326)\n\n* The heat-engine source code had a hard-coded reference to a Fedora image\nname in the implementation of the AWS-compatible LoadBalancer resource.\nThis meant that you could not specify an alternative LoadBalancer image\nname in deployments (for example, Red Hat Enterprise Linux). A new option\nhas been added to the Orchestration configuration file,\n/etc/heat/heat.conf, which is named loadbalancer_template. The new\nloadbalancer_template option can now be used to specify an alternate\nLoadBalancer template that contains a different image name. (BZ#1048215)\n\n* Due to a packaging error, the heat-manage tool was not working properly\n(which prohibited a successful database creation). This error has been\nfixed by moving the parallel package selection code so that all\nOrchestration tools now use the proper packages for use at runtime.\n(BZ#1048335)\n\nAll openstack-heat users are advised to upgrade to these updated packages,\nwhich correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0090", "url": "https://access.redhat.com/errata/RHSA-2014:0090" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/" }, { "category": "external", "summary": "1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "1046326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1046326" }, { "category": "external", "summary": "1048335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048335" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0090.json" } ], "title": "Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T07:22:25+00:00", "generator": { "date": "2024-11-22T07:22:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0090", "initial_release_date": "2014-01-22T18:31:23+00:00", "revision_history": [ { "date": "2014-01-22T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-22T18:31:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:22:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-common@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cloudwatch@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cfn@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-engine@2013.2.1-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_id": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat@2013.2.1-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src" }, "product_reference": "openstack-heat-0:2013.2.1-4.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6426", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039141" } ], "notes": [ { "category": "description", "text": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: CFN policy rules not all enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6426" }, { "category": "external", "summary": "RHBZ#1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: CFN policy rules not all enforced" }, { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6428", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039144" } ], "notes": [ { "category": "description", "text": "The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: ReST API doesn\u0027t respect tenant scoping", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6428" }, { "category": "external", "summary": "RHBZ#1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: ReST API doesn\u0027t respect tenant scoping" } ] }
rhsa-2014_0090
Vulnerability from csaf_redhat
Published
2014-01-22 18:31
Modified
2024-11-22 07:22
Summary
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
Notes
Topic
Updated openstack-heat packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise Linux
OpenStack Platform 4.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The openstack-heat packages provide heat, a Python implementation of the
OpenStack Orchestration engine, to launch multiple composite cloud
applications based on templates.
It was found that heat did not properly enforce cloudformation-compatible
API policy rules. An in-instance attacker could use the CreateStack or
UpdateStack methods to create or update a stack, resulting in a violation
of the API policy. Note that only setups using Orchestration's
cloudformation-compatible API were affected. (CVE-2013-6426)
A flaw was found in the way Orchestration's REST API implementation handled
modified request paths. An authenticated remote user could use this flaw to
bypass the tenant-scoping restriction by modifying the request path,
resulting in privilege escalation. Note that only setups using
Orchestration's cloudformation-compatible API were affected.
(CVE-2013-6428)
Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting these issues. Upstream acknowledges Steven Hardy of Red Hat as
the original reporter.
The openstack-heat packages have been upgraded to upstream version
2013.2.1, which provides a number of bug fixes and enhancements over the
previous version. The most notable fixes and enhancements are:
- Auto-scaling has been fixed when AdjustmentType was set to
PercentChangeInCapacity.
- A QPID broker restart no longer permanently disrupts subscribed clients.
- RPC requests are now only serviced by one server in a given topic group.
- Auto-scaling group growth or shrinkage has been fixed to utilize the full
available size, regardless of the scaling policy adjustment.
(BZ#1045430)
This update also fixes the following bugs:
* The outdated heat-db-setup tool, which only supported local installs, has
been removed. The Red Hat Enterprise Linux OpenStack Platform 4
Installation and Configuration Guide has been updated to show how to create
the necessary database and associated tables for Orchestration, allowing
the deployment of the database server on a local or remote system (see
Installing the OpenStack Orchestration Service). (BZ#1046326)
* The heat-engine source code had a hard-coded reference to a Fedora image
name in the implementation of the AWS-compatible LoadBalancer resource.
This meant that you could not specify an alternative LoadBalancer image
name in deployments (for example, Red Hat Enterprise Linux). A new option
has been added to the Orchestration configuration file,
/etc/heat/heat.conf, which is named loadbalancer_template. The new
loadbalancer_template option can now be used to specify an alternate
LoadBalancer template that contains a different image name. (BZ#1048215)
* Due to a packaging error, the heat-manage tool was not working properly
(which prohibited a successful database creation). This error has been
fixed by moving the parallel package selection code so that all
Orchestration tools now use the proper packages for use at runtime.
(BZ#1048335)
All openstack-heat users are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-heat packages that fix two security issues, several bugs,\nand add various enhancements are now available for Red Hat Enterprise Linux\nOpenStack Platform 4.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-heat packages provide heat, a Python implementation of the\nOpenStack Orchestration engine, to launch multiple composite cloud\napplications based on templates.\n\nIt was found that heat did not properly enforce cloudformation-compatible\nAPI policy rules. An in-instance attacker could use the CreateStack or\nUpdateStack methods to create or update a stack, resulting in a violation\nof the API policy. Note that only setups using Orchestration\u0027s\ncloudformation-compatible API were affected. (CVE-2013-6426)\n\nA flaw was found in the way Orchestration\u0027s REST API implementation handled\nmodified request paths. An authenticated remote user could use this flaw to\nbypass the tenant-scoping restriction by modifying the request path,\nresulting in privilege escalation. Note that only setups using\nOrchestration\u0027s cloudformation-compatible API were affected.\n(CVE-2013-6428)\n\nRed Hat would like to thank Jeremy Stanley of the OpenStack Project for\nreporting these issues. Upstream acknowledges Steven Hardy of Red Hat as\nthe original reporter.\n\nThe openstack-heat packages have been upgraded to upstream version\n2013.2.1, which provides a number of bug fixes and enhancements over the\nprevious version. The most notable fixes and enhancements are:\n\n- Auto-scaling has been fixed when AdjustmentType was set to\n PercentChangeInCapacity.\n\n- A QPID broker restart no longer permanently disrupts subscribed clients.\n\n- RPC requests are now only serviced by one server in a given topic group.\n\n- Auto-scaling group growth or shrinkage has been fixed to utilize the full\n available size, regardless of the scaling policy adjustment.\n\n(BZ#1045430)\n\nThis update also fixes the following bugs:\n\n* The outdated heat-db-setup tool, which only supported local installs, has\nbeen removed. The Red Hat Enterprise Linux OpenStack Platform 4\nInstallation and Configuration Guide has been updated to show how to create\nthe necessary database and associated tables for Orchestration, allowing\nthe deployment of the database server on a local or remote system (see\nInstalling the OpenStack Orchestration Service). (BZ#1046326)\n\n* The heat-engine source code had a hard-coded reference to a Fedora image\nname in the implementation of the AWS-compatible LoadBalancer resource.\nThis meant that you could not specify an alternative LoadBalancer image\nname in deployments (for example, Red Hat Enterprise Linux). A new option\nhas been added to the Orchestration configuration file,\n/etc/heat/heat.conf, which is named loadbalancer_template. The new\nloadbalancer_template option can now be used to specify an alternate\nLoadBalancer template that contains a different image name. (BZ#1048215)\n\n* Due to a packaging error, the heat-manage tool was not working properly\n(which prohibited a successful database creation). This error has been\nfixed by moving the parallel package selection code so that all\nOrchestration tools now use the proper packages for use at runtime.\n(BZ#1048335)\n\nAll openstack-heat users are advised to upgrade to these updated packages,\nwhich correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0090", "url": "https://access.redhat.com/errata/RHSA-2014:0090" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/" }, { "category": "external", "summary": "1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "1046326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1046326" }, { "category": "external", "summary": "1048335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048335" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0090.json" } ], "title": "Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T07:22:25+00:00", "generator": { "date": "2024-11-22T07:22:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0090", "initial_release_date": "2014-01-22T18:31:23+00:00", "revision_history": [ { "date": "2014-01-22T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-22T18:31:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:22:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-common@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cloudwatch@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cfn@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-engine@2013.2.1-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_id": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat@2013.2.1-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src" }, "product_reference": "openstack-heat-0:2013.2.1-4.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6426", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039141" } ], "notes": [ { "category": "description", "text": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: CFN policy rules not all enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6426" }, { "category": "external", "summary": "RHBZ#1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: CFN policy rules not all enforced" }, { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6428", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039144" } ], "notes": [ { "category": "description", "text": "The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: ReST API doesn\u0027t respect tenant scoping", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6428" }, { "category": "external", "summary": "RHBZ#1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: ReST API doesn\u0027t respect tenant scoping" } ] }
rhsa-2014:0090
Vulnerability from csaf_redhat
Published
2014-01-22 18:31
Modified
2024-11-22 07:22
Summary
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
Notes
Topic
Updated openstack-heat packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise Linux
OpenStack Platform 4.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The openstack-heat packages provide heat, a Python implementation of the
OpenStack Orchestration engine, to launch multiple composite cloud
applications based on templates.
It was found that heat did not properly enforce cloudformation-compatible
API policy rules. An in-instance attacker could use the CreateStack or
UpdateStack methods to create or update a stack, resulting in a violation
of the API policy. Note that only setups using Orchestration's
cloudformation-compatible API were affected. (CVE-2013-6426)
A flaw was found in the way Orchestration's REST API implementation handled
modified request paths. An authenticated remote user could use this flaw to
bypass the tenant-scoping restriction by modifying the request path,
resulting in privilege escalation. Note that only setups using
Orchestration's cloudformation-compatible API were affected.
(CVE-2013-6428)
Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting these issues. Upstream acknowledges Steven Hardy of Red Hat as
the original reporter.
The openstack-heat packages have been upgraded to upstream version
2013.2.1, which provides a number of bug fixes and enhancements over the
previous version. The most notable fixes and enhancements are:
- Auto-scaling has been fixed when AdjustmentType was set to
PercentChangeInCapacity.
- A QPID broker restart no longer permanently disrupts subscribed clients.
- RPC requests are now only serviced by one server in a given topic group.
- Auto-scaling group growth or shrinkage has been fixed to utilize the full
available size, regardless of the scaling policy adjustment.
(BZ#1045430)
This update also fixes the following bugs:
* The outdated heat-db-setup tool, which only supported local installs, has
been removed. The Red Hat Enterprise Linux OpenStack Platform 4
Installation and Configuration Guide has been updated to show how to create
the necessary database and associated tables for Orchestration, allowing
the deployment of the database server on a local or remote system (see
Installing the OpenStack Orchestration Service). (BZ#1046326)
* The heat-engine source code had a hard-coded reference to a Fedora image
name in the implementation of the AWS-compatible LoadBalancer resource.
This meant that you could not specify an alternative LoadBalancer image
name in deployments (for example, Red Hat Enterprise Linux). A new option
has been added to the Orchestration configuration file,
/etc/heat/heat.conf, which is named loadbalancer_template. The new
loadbalancer_template option can now be used to specify an alternate
LoadBalancer template that contains a different image name. (BZ#1048215)
* Due to a packaging error, the heat-manage tool was not working properly
(which prohibited a successful database creation). This error has been
fixed by moving the parallel package selection code so that all
Orchestration tools now use the proper packages for use at runtime.
(BZ#1048335)
All openstack-heat users are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-heat packages that fix two security issues, several bugs,\nand add various enhancements are now available for Red Hat Enterprise Linux\nOpenStack Platform 4.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-heat packages provide heat, a Python implementation of the\nOpenStack Orchestration engine, to launch multiple composite cloud\napplications based on templates.\n\nIt was found that heat did not properly enforce cloudformation-compatible\nAPI policy rules. An in-instance attacker could use the CreateStack or\nUpdateStack methods to create or update a stack, resulting in a violation\nof the API policy. Note that only setups using Orchestration\u0027s\ncloudformation-compatible API were affected. (CVE-2013-6426)\n\nA flaw was found in the way Orchestration\u0027s REST API implementation handled\nmodified request paths. An authenticated remote user could use this flaw to\nbypass the tenant-scoping restriction by modifying the request path,\nresulting in privilege escalation. Note that only setups using\nOrchestration\u0027s cloudformation-compatible API were affected.\n(CVE-2013-6428)\n\nRed Hat would like to thank Jeremy Stanley of the OpenStack Project for\nreporting these issues. Upstream acknowledges Steven Hardy of Red Hat as\nthe original reporter.\n\nThe openstack-heat packages have been upgraded to upstream version\n2013.2.1, which provides a number of bug fixes and enhancements over the\nprevious version. The most notable fixes and enhancements are:\n\n- Auto-scaling has been fixed when AdjustmentType was set to\n PercentChangeInCapacity.\n\n- A QPID broker restart no longer permanently disrupts subscribed clients.\n\n- RPC requests are now only serviced by one server in a given topic group.\n\n- Auto-scaling group growth or shrinkage has been fixed to utilize the full\n available size, regardless of the scaling policy adjustment.\n\n(BZ#1045430)\n\nThis update also fixes the following bugs:\n\n* The outdated heat-db-setup tool, which only supported local installs, has\nbeen removed. The Red Hat Enterprise Linux OpenStack Platform 4\nInstallation and Configuration Guide has been updated to show how to create\nthe necessary database and associated tables for Orchestration, allowing\nthe deployment of the database server on a local or remote system (see\nInstalling the OpenStack Orchestration Service). (BZ#1046326)\n\n* The heat-engine source code had a hard-coded reference to a Fedora image\nname in the implementation of the AWS-compatible LoadBalancer resource.\nThis meant that you could not specify an alternative LoadBalancer image\nname in deployments (for example, Red Hat Enterprise Linux). A new option\nhas been added to the Orchestration configuration file,\n/etc/heat/heat.conf, which is named loadbalancer_template. The new\nloadbalancer_template option can now be used to specify an alternate\nLoadBalancer template that contains a different image name. (BZ#1048215)\n\n* Due to a packaging error, the heat-manage tool was not working properly\n(which prohibited a successful database creation). This error has been\nfixed by moving the parallel package selection code so that all\nOrchestration tools now use the proper packages for use at runtime.\n(BZ#1048335)\n\nAll openstack-heat users are advised to upgrade to these updated packages,\nwhich correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0090", "url": "https://access.redhat.com/errata/RHSA-2014:0090" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/" }, { "category": "external", "summary": "1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "1046326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1046326" }, { "category": "external", "summary": "1048335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048335" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0090.json" } ], "title": "Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T07:22:25+00:00", "generator": { "date": "2024-11-22T07:22:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0090", "initial_release_date": "2014-01-22T18:31:23+00:00", "revision_history": [ { "date": "2014-01-22T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-22T18:31:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:22:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-common@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cloudwatch@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-api-cfn@2013.2.1-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_id": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat-engine@2013.2.1-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_id": "openstack-heat-0:2013.2.1-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-heat@2013.2.1-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-0:2013.2.1-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src" }, "product_reference": "openstack-heat-0:2013.2.1-4.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" }, "product_reference": "openstack-heat-engine-0:2013.2.1-4.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6426", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039141" } ], "notes": [ { "category": "description", "text": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: CFN policy rules not all enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6426" }, { "category": "external", "summary": "RHBZ#1039141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: CFN policy rules not all enforced" }, { "acknowledgments": [ { "names": [ "Jeremy Stanley" ], "organization": "OpenStack Project" }, { "names": [ "Steven Hardy" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6428", "discovery_date": "2013-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1039144" } ], "notes": [ { "category": "description", "text": "The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.", "title": "Vulnerability description" }, { "category": "summary", "text": "Heat: ReST API doesn\u0027t respect tenant scoping", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6428" }, { "category": "external", "summary": "RHBZ#1039144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6428" } ], "release_date": "2013-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-22T18:31:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nDocumentation for releases of Red Hat Enterprise Linux OpenStack Platform\nis available at\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/", "product_ids": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0090" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-heat-0:2013.2.1-4.el6ost.src", "6Server-RHOS-4.0:openstack-heat-api-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cfn-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-api-cloudwatch-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-common-0:2013.2.1-4.el6ost.noarch", "6Server-RHOS-4.0:openstack-heat-engine-0:2013.2.1-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Heat: ReST API doesn\u0027t respect tenant scoping" } ] }
ghsa-3m5x-89wr-x574
Vulnerability from github
Published
2022-05-17 01:30
Modified
2022-05-17 01:30
Details
The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.
{ "affected": [], "aliases": [ "CVE-2013-6426" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-12-14T17:21:00Z", "severity": "MODERATE" }, "details": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "id": "GHSA-3m5x-89wr-x574", "modified": "2022-05-17T01:30:29Z", "published": "2022-05-17T01:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6426" }, { "type": "WEB", "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/64243" } ], "schema_version": "1.4.0", "severity": [] }
cve-2013-6426
Vulnerability from fkie_nvd
Published
2013-12-14 17:21
Modified
2024-11-21 01:59
Severity ?
Summary
The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:heat:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA1ACE95-4A57-4550-BC00-ACDA7B593FC5", "versionEndIncluding": "2013.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method." }, { "lang": "es", "value": "El API compatible con CloudFormation en API OpenStack orquestaci\u00f3n (Heat) antes de Habana 2013.2.1 y anterior a Icehouse Icehouse-2 no aplica correctamente las reglas de pol\u00edtica, lo que permite a los usuarios locales en la instancia evitar las restricciones de acceso establecidas y, (1) crear una pila a trav\u00e9s de el m\u00e9todo CreateStack o, (2) actualizar una pila a trav\u00e9s del m\u00e9todo UpdateStack." } ], "id": "CVE-2013-6426", "lastModified": "2024-11-21T01:59:12.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-14T17:21:47.147", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/64243" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2013-6426
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-6426", "description": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "id": "GSD-2013-6426", "references": [ "https://www.suse.com/security/cve/CVE-2013-6426.html", "https://access.redhat.com/errata/RHSA-2014:0090" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-6426" ], "details": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method.", "id": "GSD-2013-6426", "modified": "2023-12-13T01:22:19.571604Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2014-0090.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "name": "http://www.openwall.com/lists/oss-security/2013/12/11/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "name": "http://www.securityfocus.com/bid/64243", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/64243" }, { "name": "https://bugs.launchpad.net/heat/+bug/1256049", "refsource": "MISC", "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:heat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2013.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6426" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) create a stack via the CreateStack method or (2) update a stack via the UpdateStack method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20131211 [OSSA 2013-034] Heat CFN policy rules not all enforced (CVE-2013-6426)", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2013/12/11/9" }, { "name": "64243", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/64243" }, { "name": "https://bugs.launchpad.net/heat/+bug/1256049", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/heat/+bug/1256049" }, { "name": "RHSA-2014:0090", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0090.html" }, { "name": "keystone-cve20136426-sec-bypass(89658)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89658" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-08-29T01:33Z", "publishedDate": "2013-12-14T17:21Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.