CVE-2017-2627

A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2627 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2627 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:openstack:tripleo-common:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:23

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2627 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2627 - Issue Tracking, Vendor Advisory

Information

Published : 2018-08-22 17:29

Updated : 2024-11-21 03:23


NVD link : CVE-2017-2627

Mitre link : CVE-2017-2627

CVE.ORG link : CVE-2017-2627


JSON object : View

Products Affected

openstack

  • tripleo-common

redhat

  • openstack
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')