ghsa-9773-3fqg-8w25
Vulnerability from github
Published
2022-05-13 01:07
Modified
2024-10-03 21:27
Severity ?
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.1 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
7.1 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
OpenStack Neutron's unsupported dport option prevents applying security groups
Details
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "neutron" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "10.0.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "neutron" }, "ranges": [ { "events": [ { "introduced": "11.0.0" }, { "fixed": "11.0.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "neutron" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "neutron" }, "ranges": [ { "events": [ { "introduced": "13.0.0" }, { "fixed": "13.0.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-9735" ], "database_specific": { "cwe_ids": [ "CWE-755" ], "github_reviewed": true, "github_reviewed_at": "2024-04-08T18:55:25Z", "nvd_published_at": "2019-03-13T02:29:00Z", "severity": "HIGH" }, "details": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)", "id": "GHSA-9773-3fqg-8w25", "modified": "2024-10-03T21:27:55Z", "published": "2022-05-13T01:07:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9735" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0879" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0916" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0935" }, { "type": "PACKAGE", "url": "https://github.com/openstack/neutron" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2019-190.yaml" }, { "type": "WEB", "url": "https://launchpad.net/bugs/1818385" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Mar/24" }, { "type": "WEB", "url": "https://security.openstack.org/ossa/OSSA-2019-001.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4036-1" }, { "type": "WEB", "url": "https://web.archive.org/web/20201208185619/http://www.securityfocus.com/bid/107390" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4409" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/03/18/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/107390" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "OpenStack Neutron\u0027s unsupported dport option prevents applying security groups" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.