First published: Mon Apr 07 2014(Updated: )
The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Compute (Nova) | =2013.1 | |
OpenStack Compute (Nova) | =2013.1.1 | |
OpenStack Compute (Nova) | =2013.1.2 | |
OpenStack Compute (Nova) | =2013.1.3 | |
OpenStack Compute (Nova) | =2013.2 | |
OpenStack Compute (Nova) | =2013.2.1 | |
OpenStack Compute (Nova) | =2013.2.2 | |
OpenStack Compute (Nova) | =2013.2.3 | |
OpenStack Icehouse | ||
pip/nova | >=2013.1.0<2013.2.4 | 2013.2.4 |
=2013.1 | ||
=2013.1.1 | ||
=2013.1.2 | ||
=2013.1.3 | ||
=2013.2 | ||
=2013.2.1 | ||
=2013.2.2 | ||
=2013.2.3 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0167 has a moderate severity level as it can lead to unauthorized access to security group modifications.
To fix CVE-2014-0167, upgrade your OpenStack Compute to the version 2013.2.4 or later, or Icehouse-rc2 or later.
CVE-2014-0167 affects OpenStack Compute versions 2013.1 through 2013.2.3 and all versions of Icehouse prior to Icehouse-rc2.
CVE-2014-0167 impacts the Nova EC2 API security group implementation within OpenStack Compute.
There are no reliable workarounds; the recommended action is to upgrade to a secure version as soon as possible.