GHSA-9773-3FQG-8W25
Vulnerability from github – Published: 2022-05-13 01:07 – Updated: 2024-10-03 21:27
VLAI?
Summary
OpenStack Neutron's unsupported dport option prevents applying security groups
Details
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "10.0.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "11.0.0"
},
{
"fixed": "11.0.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "12.0.0"
},
{
"fixed": "12.0.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "13.0.0"
},
{
"fixed": "13.0.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2019-9735"
],
"database_specific": {
"cwe_ids": [
"CWE-755"
],
"github_reviewed": true,
"github_reviewed_at": "2024-04-08T18:55:25Z",
"nvd_published_at": "2019-03-13T02:29:00Z",
"severity": "HIGH"
},
"details": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)",
"id": "GHSA-9773-3fqg-8w25",
"modified": "2024-10-03T21:27:55Z",
"published": "2022-05-13T01:07:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9735"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0879"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0916"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0935"
},
{
"type": "PACKAGE",
"url": "https://github.com/openstack/neutron"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2019-190.yaml"
},
{
"type": "WEB",
"url": "https://launchpad.net/bugs/1818385"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Mar/24"
},
{
"type": "WEB",
"url": "https://security.openstack.org/ossa/OSSA-2019-001.html"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4036-1"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20201208185619/http://www.securityfocus.com/bid/107390"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2019/dsa-4409"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/03/18/2"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107390"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenStack Neutron\u0027s unsupported dport option prevents applying security groups"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…