Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qamdoLW0zMjItZmp4Ns4AAg4R

Openstack Octavia Access Control Vulnerability

Description

An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.

Mitigation

To prevent this vulnerability:

  1. Update Octavia's configuration setting (octavia.conf) to amp_image_owner_id = $UUID_OF_SERVICE_PROJECT on all Octavia nodes.
  2. Enable the new configuration by restarting both octavia_worker and octavia_health_manager.
Permalink: https://github.com/advisories/GHSA-jjgh-m322-fjx6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qamdoLW0zMjItZmp4Ns4AAg4R
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 3 months ago


CVSS Score: 5.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

Identifiers: GHSA-jjgh-m322-fjx6, CVE-2019-3895
References: Repository: https://github.com/openstack/octavia
Blast Radius: 2.6

Affected Packages

pypi:octavia
Dependent packages: 1
Dependent repositories: 3
Downloads: 1,217 last month
Affected Version Ranges: < 0.9.0
Fixed in: 0.9.0
All affected versions: 0.5.2, 0.8.0, 0.8.1
All unaffected versions: 0.9.0, 0.9.1, 0.9.2, 0.10.0, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.0, 2.1.1, 2.1.2, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.2.0, 3.2.1, 3.2.2, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1.0, 5.1.1, 5.1.2, 6.0.0, 6.0.1, 6.1.0, 6.2.0, 6.2.1, 6.2.2, 7.0.0, 7.1.0, 7.1.1, 7.1.2, 8.0.0, 8.0.1, 9.0.0, 9.0.1, 9.1.0, 10.0.0, 10.1.0, 10.1.1, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 12.0.0, 13.0.0, 14.0.0