UBUNTU-CVE-2017-12440

Source
https://ubuntu.com/security/CVE-2017-12440
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-12440.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-12440
Related
Published
2017-08-18T14:29:00Z
Modified
2025-01-13T10:21:25Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.

References

Affected packages

Ubuntu:Pro:16.04:LTS / aodh

Package

Name
aodh
Purl
pkg:deb/ubuntu/aodh@2.0.6-0ubuntu1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.0-6
1.0.0-7

2.*

2.0.0~b1-0ubuntu1
2.0.0~b1-0ubuntu2
2.0.0~b2-2ubuntu1
2.0.0~b2-2ubuntu2
2.0.0~b3-0ubuntu1
2.0.0~rc1-0ubuntu1
2.0.0-0ubuntu1
2.0.1-0ubuntu1
2.0.2-0ubuntu1
2.0.4-0ubuntu1
2.0.5-0ubuntu1
2.0.6-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}