A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
References
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2018:0602 - | |
References | () https://access.redhat.com/errata/RHSA-2018:1593 - | |
References | () https://access.redhat.com/errata/RHSA-2018:1627 - | |
References | () https://bugs.launchpad.net/tripleo/+bug/1720787 - Issue Tracking, Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1489360 - Issue Tracking, Mitigation |
Information
Published : 2017-12-12 20:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-12155
Mitre link : CVE-2017-12155
CVE.ORG link : CVE-2017-12155
JSON object : View
Products Affected
ceph
- ceph
CWE
CWE-306
Missing Authentication for Critical Function