GHSA-jjgh-m322-fjx6

Suggest an improvement
Source
https://github.com/advisories/GHSA-jjgh-m322-fjx6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jjgh-m322-fjx6/GHSA-jjgh-m322-fjx6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jjgh-m322-fjx6
Aliases
Published
2022-05-24T16:47:03Z
Modified
2024-10-08T13:05:28.263412Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Openstack Octavia Access Control Vulnerability
Details

Description

An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.

Mitigation

To prevent this vulnerability: 1. Update Octavia's configuration setting (octavia.conf) to amp_image_owner_id = $UUID_OF_SERVICE_PROJECT on all Octavia nodes. 2. Enable the new configuration by restarting both octavia_worker and octavia_health_manager.

Database specific
{
    "nvd_published_at": "2019-06-03T19:29:00Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-23T20:36:33Z"
}
References

Affected packages

PyPI / octavia

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.0

Affected versions

0.*

0.5.2
0.8.0
0.8.1