Description
A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5532 | A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume. |
Github GHSA |
GHSA-w8gx-hhcx-px6w | Openstack tripleo-heat-templates unauthenticated file access |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T17:22:48.181Z
Reserved: 2017-08-01T00:00:00.000Z
Link: CVE-2017-12155
No data.
Status : Modified
Published: 2017-12-12T20:29:00.227
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-12155
OpenCVE Enrichment
No data.
EUVD
Github GHSA