CVE-2017-12155

A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ceph:ceph:-:*:*:*:*:openstack:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:0602 - () https://access.redhat.com/errata/RHSA-2018:0602 -
References () https://access.redhat.com/errata/RHSA-2018:1593 - () https://access.redhat.com/errata/RHSA-2018:1593 -
References () https://access.redhat.com/errata/RHSA-2018:1627 - () https://access.redhat.com/errata/RHSA-2018:1627 -
References () https://bugs.launchpad.net/tripleo/+bug/1720787 - Issue Tracking, Patch () https://bugs.launchpad.net/tripleo/+bug/1720787 - Issue Tracking, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=1489360 - Issue Tracking, Mitigation () https://bugzilla.redhat.com/show_bug.cgi?id=1489360 - Issue Tracking, Mitigation

Information

Published : 2017-12-12 20:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-12155

Mitre link : CVE-2017-12155

CVE.ORG link : CVE-2017-12155


JSON object : View

Products Affected

ceph

  • ceph
CWE
CWE-306

Missing Authentication for Critical Function