CVE-2013-2030: OpenStack Nova uses insecure keystone middleware tmpdir by default
(updated )
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
References
- bugs.launchpad.net/nova/+bug/1174608
- bugzilla.redhat.com/show_bug.cgi?id=958285
- github.com/advisories/GHSA-pxxv-rv32-2qgv
- github.com/openstack/nova
- github.com/openstack/nova/commit/58d6879b1caaa750c39c8e452a0634c24ffef2ce
- github.com/openstack/nova/commit/74aa04e2ca7942cb1e1a86dcbaffeb72d260ccd7
- github.com/openstack/nova/commit/7bf3e8d3e254d817ff5ae7ef1f2884b10410ca60
- github.com/openstack/python-keystoneclient/commit/1736e2ffb12f70eeebed019448bc14def48aa036
- github.com/pypa/advisory-database/tree/main/vulns/nova/PYSEC-2013-45.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-2030
Detect and mitigate CVE-2013-2030 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →