CVE-2012-2654

The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:compute:2012.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:diablo:2011.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:39

Type Values Removed Values Added
References () http://secunia.com/advisories/46808 - Vendor Advisory () http://secunia.com/advisories/46808 - Vendor Advisory
References () http://secunia.com/advisories/49439 - Vendor Advisory () http://secunia.com/advisories/49439 - Vendor Advisory
References () http://www.ubuntu.com/usn/USN-1466-1 - () http://www.ubuntu.com/usn/USN-1466-1 -
References () https://bugs.launchpad.net/nova/+bug/985184 - Patch () https://bugs.launchpad.net/nova/+bug/985184 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/76110 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/76110 -
References () https://github.com/openstack/nova/commit/9f9e9da777161426a6f8cb4314b78e09beac2978 - Exploit, Patch () https://github.com/openstack/nova/commit/9f9e9da777161426a6f8cb4314b78e09beac2978 - Exploit, Patch
References () https://github.com/openstack/nova/commit/ff06c7c885dc94ed7c828e8cdbb8b5d850a7e654 - Exploit, Patch () https://github.com/openstack/nova/commit/ff06c7c885dc94ed7c828e8cdbb8b5d850a7e654 - Exploit, Patch
References () https://lists.launchpad.net/openstack/msg12883.html - () https://lists.launchpad.net/openstack/msg12883.html -
References () https://review.openstack.org/#/c/8239/ - () https://review.openstack.org/#/c/8239/ -

Information

Published : 2012-06-21 15:55

Updated : 2024-11-21 01:39


NVD link : CVE-2012-2654

Mitre link : CVE-2012-2654

CVE.ORG link : CVE-2012-2654


JSON object : View

Products Affected

openstack

  • compute
  • essex
  • diablo
CWE
CWE-20

Improper Input Validation