CVE-2021-4180: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.
References
- bugs.launchpad.net/tripleo/+bug/1955397
- bugzilla.redhat.com/show_bug.cgi?id=2035793
- github.com/advisories/GHSA-hm3x-jwwf-jpr9
- github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea
- github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515
- nvd.nist.gov/vuln/detail/CVE-2021-4180
Detect and mitigate CVE-2021-4180 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →