Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2017-12440
Vulnerability from cvelistv5
Published
2017-08-18 14:00
Modified
2024-08-05 18:36
Severity ?
EPSS score ?
Summary
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/493826/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/493823/" }, { "name": "100455", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100455" }, { "name": "DSA-3953", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3953" }, { "name": "RHSA-2017:3227", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "name": "RHSA-2018:0315", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/493824/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-14T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/493826/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/493823/" }, { "name": "100455", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100455" }, { "name": "DSA-3953", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3953" }, { "name": "RHSA-2017:3227", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "name": "RHSA-2018:0315", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/493824/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12440", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.launchpad.net/ossn/+bug/1649333", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "name": "https://review.openstack.org/#/c/493826/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493826/" }, { "name": "https://review.openstack.org/#/c/493823/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493823/" }, { "name": "100455", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100455" }, { "name": "DSA-3953", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3953" }, { "name": "RHSA-2017:3227", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "name": "RHSA-2018:0315", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "name": "https://review.openstack.org/#/c/493824/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493824/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12440", "datePublished": "2017-08-18T14:00:00", "dateReserved": "2017-08-04T00:00:00", "dateUpdated": "2024-08-05T18:36:56.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:openstack:07132017:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A918C7A9-B922-41FA-9B3E-08F66454B41F\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.\"}, {\"lang\": \"es\", \"value\": \"Aodh, tal y como viene en Openstack Ocata y Newton antes de change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 y antes de Pike-rc1, no verifica que las ID de confianza pertenecen al usuario cuando se crean acciones de alarma con el esquema \\\"trust+http\\\", lo que permite a los usuarios autenticados remotos con conocimiento sobre las ID de confianza en donde Aodh es la entidad de confianza obtener un token Keystone y realizar acciones autenticadas no especificadas a\\u00f1adiendo una acci\\u00f3n de alarma con el esquema \\\"trust+http\\\" y proporcionando una ID de confianza en donde Aodh es la entidad de confianza.\"}]", "id": "CVE-2017-12440", "lastModified": "2024-11-21T03:09:29.210", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-08-18T14:29:00.377", "references": "[{\"url\": \"http://www.debian.org/security/2017/dsa-3953\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/100455\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3227\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0315\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugs.launchpad.net/ossn/+bug/1649333\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493823/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493824/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493826/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3953\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/100455\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3227\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0315\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.launchpad.net/ossn/+bug/1649333\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493823/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493824/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://review.openstack.org/#/c/493826/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-12440\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-18T14:29:00.377\",\"lastModified\":\"2024-11-21T03:09:29.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.\"},{\"lang\":\"es\",\"value\":\"Aodh, tal y como viene en Openstack Ocata y Newton antes de change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 y antes de Pike-rc1, no verifica que las ID de confianza pertenecen al usuario cuando se crean acciones de alarma con el esquema \\\"trust+http\\\", lo que permite a los usuarios autenticados remotos con conocimiento sobre las ID de confianza en donde Aodh es la entidad de confianza obtener un token Keystone y realizar acciones autenticadas no especificadas a\u00f1adiendo una acci\u00f3n de alarma con el esquema \\\"trust+http\\\" y proporcionando una ID de confianza en donde Aodh es la entidad de confianza.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:openstack:07132017:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A918C7A9-B922-41FA-9B3E-08F66454B41F\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3953\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/100455\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3227\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0315\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.launchpad.net/ossn/+bug/1649333\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493823/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493824/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493826/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3953\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/100455\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/ossn/+bug/1649333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493823/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493824/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://review.openstack.org/#/c/493826/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
rhsa-2017_3227
Vulnerability from csaf_redhat
Published
2017-11-15 13:25
Modified
2024-11-14 21:45
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
This issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nThis issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3227", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3227.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:45:35+00:00", "generator": { "date": "2024-11-14T21:45:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3227", "initial_release_date": "2017-11-15T13:25:52+00:00", "revision_history": [ { "date": "2017-11-15T13:25:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-15T13:25:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:45:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@3.0.4-1.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_id": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@3.0.4-1.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src" }, "product_reference": "openstack-aodh-0:3.0.4-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-15T13:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3227" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
rhsa-2017:3227
Vulnerability from csaf_redhat
Published
2017-11-15 13:25
Modified
2024-11-14 21:45
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
This issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nThis issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3227", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3227.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:45:35+00:00", "generator": { "date": "2024-11-14T21:45:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3227", "initial_release_date": "2017-11-15T13:25:52+00:00", "revision_history": [ { "date": "2017-11-15T13:25:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-15T13:25:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:45:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@3.0.4-1.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_id": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@3.0.4-1.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src" }, "product_reference": "openstack-aodh-0:3.0.4-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-15T13:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3227" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
rhsa-2018_0315
Vulnerability from csaf_redhat
Published
2018-02-13 19:22
Modified
2024-11-14 21:47
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
openstack-aodh has been rebased to the upstream 4.0.2-3 version.
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nopenstack-aodh has been rebased to the upstream 4.0.2-3 version.\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nRed Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0315", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "1511108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511108" }, { "category": "external", "summary": "1531873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531873" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0315.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:47:37+00:00", "generator": { "date": "2024-11-14T21:47:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0315", "initial_release_date": "2018-02-13T19:22:45+00:00", "revision_history": [ { "date": "2018-02-13T19:22:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-13T19:22:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:47:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 11.0", "product": { "name": "Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@4.0.2-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_id": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@4.0.2-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src" }, "product_reference": "openstack-aodh-0:4.0.2-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-13T19:22:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0315" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
RHSA-2017:3227
Vulnerability from csaf_redhat
Published
2017-11-15 13:25
Modified
2024-11-14 21:45
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
This issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nThis issue was discovered by Luke Hinds (Red Hat). Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3227", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3227.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:45:35+00:00", "generator": { "date": "2024-11-14T21:45:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3227", "initial_release_date": "2017-11-15T13:25:52+00:00", "revision_history": [ { "date": "2017-11-15T13:25:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-15T13:25:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:45:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_id": "python-aodh-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@3.0.4-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_id": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@3.0.4-1.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_id": "openstack-aodh-0:3.0.4-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@3.0.4-1.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:3.0.4-1.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src" }, "product_reference": "openstack-aodh-0:3.0.4-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:3.0.4-1.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:3.0.4-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-15T13:25:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3227" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-aodh-0:3.0.4-1.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-aodh-api-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-common-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-compat-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-evaluator-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-expirer-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-listener-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-aodh-notifier-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-0:3.0.4-1.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-aodh-tests-0:3.0.4-1.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
RHSA-2018:0315
Vulnerability from csaf_redhat
Published
2018-02-13 19:22
Modified
2024-11-14 21:47
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
openstack-aodh has been rebased to the upstream 4.0.2-3 version.
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nopenstack-aodh has been rebased to the upstream 4.0.2-3 version.\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nRed Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0315", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "1511108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511108" }, { "category": "external", "summary": "1531873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531873" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0315.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:47:37+00:00", "generator": { "date": "2024-11-14T21:47:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0315", "initial_release_date": "2018-02-13T19:22:45+00:00", "revision_history": [ { "date": "2018-02-13T19:22:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-13T19:22:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:47:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 11.0", "product": { "name": "Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@4.0.2-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_id": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@4.0.2-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src" }, "product_reference": "openstack-aodh-0:4.0.2-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-13T19:22:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0315" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
rhsa-2018:0315
Vulnerability from csaf_redhat
Published
2018-02-13 19:22
Modified
2024-11-14 21:47
Summary
Red Hat Security Advisory: openstack-aodh security update
Notes
Topic
An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).
openstack-aodh has been rebased to the upstream 4.0.2-3 version.
Security Fix(es):
* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person's trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)
Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-aodh is now available for Red Hat OpenStack Platform 11.0 (Ocata).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "openstack-aodh provides the ability to trigger actions based on defined rules against metric or event data collected by OpenStack Telemetry (ceilometer) or Time-Series-Database-as-a-Service (gnocchi).\n\nopenstack-aodh has been rebased to the upstream 4.0.2-3 version.\n\nSecurity Fix(es):\n\n* A verification flaw was found in openstack-aodh. As part of an HTTP alarm action, a user could pass in a trust ID. However, the trust could be from anyone because it was not verified. Because the trust was then used by openstack-aodh to obtain a keystone token for the alarm action, a malicious user could pass in another person\u0027s trust ID and obtain a keystone token containing the delegated authority of that user. (CVE-2017-12440)\n\nRed Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Zane Bitter (Red Hat) as the original reporter.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0315", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "1511108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511108" }, { "category": "external", "summary": "1531873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531873" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0315.json" } ], "title": "Red Hat Security Advisory: openstack-aodh security update", "tracking": { "current_release_date": "2024-11-14T21:47:37+00:00", "generator": { "date": "2024-11-14T21:47:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0315", "initial_release_date": "2018-02-13T19:22:45+00:00", "revision_history": [ { "date": "2018-02-13T19:22:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-13T19:22:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:47:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 11.0", "product": { "name": "Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-notifier@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh-tests@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-api@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-common@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-compat@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-evaluator@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_id": "python-aodh-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aodh@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-listener@4.0.2-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_id": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh-expirer@4.0.2-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_id": "openstack-aodh-0:4.0.2-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-aodh@4.0.2-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-0:4.0.2-3.el7ost.src as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src" }, "product_reference": "openstack-aodh-0:4.0.2-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch" }, "product_reference": "openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-aodh-tests-0:4.0.2-3.el7ost.noarch as a component of Red Hat OpenStack Platform 11.0", "product_id": "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" }, "product_reference": "python-aodh-tests-0:4.0.2-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-11.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Zane Bitter" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-12440", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2017-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1478834" } ], "notes": [ { "category": "description", "text": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-aodh: Aodh can be used to launder Keystone trusts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12440" }, { "category": "external", "summary": "RHBZ#1478834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12440", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "category": "external", "summary": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080", "url": "https://wiki.openstack.org/wiki/OSSN/OSSN-0080" } ], "release_date": "2017-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-13T19:22:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0315" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-11.0:openstack-aodh-0:4.0.2-3.el7ost.src", "7Server-RH7-RHOS-11.0:openstack-aodh-api-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-common-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-compat-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-evaluator-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-expirer-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-listener-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:openstack-aodh-notifier-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-0:4.0.2-3.el7ost.noarch", "7Server-RH7-RHOS-11.0:python-aodh-tests-0:4.0.2-3.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-aodh: Aodh can be used to launder Keystone trusts" } ] }
gsd-2017-12440
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-12440", "description": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "id": "GSD-2017-12440", "references": [ "https://www.suse.com/security/cve/CVE-2017-12440.html", "https://www.debian.org/security/2017/dsa-3953", "https://access.redhat.com/errata/RHSA-2018:0315", "https://access.redhat.com/errata/RHSA-2017:3227" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-12440" ], "details": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "id": "GSD-2017-12440", "modified": "2023-12-13T01:21:03.331266Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12440", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.launchpad.net/ossn/+bug/1649333", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "name": "https://review.openstack.org/#/c/493826/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493826/" }, { "name": "https://review.openstack.org/#/c/493823/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493823/" }, { "name": "100455", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100455" }, { "name": "DSA-3953", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3953" }, { "name": "RHSA-2017:3227", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "name": "RHSA-2018:0315", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "name": "https://review.openstack.org/#/c/493824/", "refsource": "CONFIRM", "url": "https://review.openstack.org/#/c/493824/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:openstack:07132017:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12440" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-306" } ] } ] }, "references": { "reference_data": [ { "name": "https://review.openstack.org/#/c/493826/", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493826/" }, { "name": "https://review.openstack.org/#/c/493824/", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493824/" }, { "name": "https://review.openstack.org/#/c/493823/", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory", "Patch" ], "url": "https://review.openstack.org/#/c/493823/" }, { "name": "https://bugs.launchpad.net/ossn/+bug/1649333", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "name": "100455", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100455" }, { "name": "DSA-3953", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2017/dsa-3953" }, { "name": "RHSA-2017:3227", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "name": "RHSA-2018:0315", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2018:0315" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-03T00:03Z", "publishedDate": "2017-08-18T14:29Z" } } }
fkie_cve-2017-12440
Vulnerability from fkie_nvd
Published
2017-08-18 14:29
Modified
2024-11-21 03:09
Severity ?
Summary
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:openstack:07132017:*:*:*:*:*:*:*", "matchCriteriaId": "A918C7A9-B922-41FA-9B3E-08F66454B41F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee." }, { "lang": "es", "value": "Aodh, tal y como viene en Openstack Ocata y Newton antes de change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 y antes de Pike-rc1, no verifica que las ID de confianza pertenecen al usuario cuando se crean acciones de alarma con el esquema \"trust+http\", lo que permite a los usuarios autenticados remotos con conocimiento sobre las ID de confianza en donde Aodh es la entidad de confianza obtener un token Keystone y realizar acciones autenticadas no especificadas a\u00f1adiendo una acci\u00f3n de alarma con el esquema \"trust+http\" y proporcionando una ID de confianza en donde Aodh es la entidad de confianza." } ], "id": "CVE-2017-12440", "lastModified": "2024-11-21T03:09:29.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-18T14:29:00.377", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3953" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100455" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493823/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493824/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493826/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493823/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493824/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://review.openstack.org/#/c/493826/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-86cv-9gpx-6hwj
Vulnerability from github
Published
2022-05-13 01:42
Modified
2024-05-14 20:50
Severity ?
Summary
Openstack Aodh can be used to launder Keystone trusts
Details
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "aodh" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "6.0.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-12440" ], "database_specific": { "cwe_ids": [ "CWE-306" ], "github_reviewed": true, "github_reviewed_at": "2024-05-14T20:50:05Z", "nvd_published_at": "2017-08-18T14:29:00Z", "severity": "HIGH" }, "details": "Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.", "id": "GHSA-86cv-9gpx-6hwj", "modified": "2024-05-14T20:50:05Z", "published": "2022-05-13T01:42:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12440" }, { "type": "WEB", "url": "https://github.com/openstack/aodh/commit/149d3ad2193b4d17df801f82a0a6be62dba564db" }, { "type": "WEB", "url": "https://github.com/openstack/aodh/commit/92182de328d1f088c5f5a68326d2b207b21e06ea" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3227" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0315" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ossn/+bug/1649333" }, { "type": "WEB", "url": "https://review.openstack.org/#/c/493823" }, { "type": "WEB", "url": "https://review.openstack.org/#/c/493824" }, { "type": "WEB", "url": "https://review.openstack.org/#/c/493826" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3953" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/100455" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Openstack Aodh can be used to launder Keystone trusts" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.