CVE-2017-12440: Openstack Aodh can be used to launder Keystone trusts
(updated )
Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
References
- access.redhat.com/errata/RHSA-2017:3227
- access.redhat.com/errata/RHSA-2018:0315
- bugs.launchpad.net/ossn/+bug/1649333
- github.com/advisories/GHSA-86cv-9gpx-6hwj
- github.com/openstack/aodh/commit/149d3ad2193b4d17df801f82a0a6be62dba564db
- github.com/openstack/aodh/commit/92182de328d1f088c5f5a68326d2b207b21e06ea
- nvd.nist.gov/vuln/detail/CVE-2017-12440
- review.openstack.org/
- review.openstack.org/
- review.openstack.org/
Detect and mitigate CVE-2017-12440 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →