First published: Thu Sep 10 2015(Updated: )
The TripleO Heat templates (tripleo-heat-templates) do not properly order the Identity Service (keystone) before the OpenStack Object Storage (Swift) staticweb middleware in the swiftproxy pipeline when the staticweb middleware is enabled, which might allow remote attackers to obtain sensitive information from private containers via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack | =7.0 | |
Openstack Tripleo Heat Templates | ||
pip/tripleo-heat-templates | <0.8.7 | 0.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5271 has a medium severity level due to potential information exposure to remote attackers.
To fix CVE-2015-5271, upgrade the tripleo-heat-templates package to version 0.8.7 or higher.
CVE-2015-5271 affects Red Hat OpenStack 7.0 and OpenStack Tripleo Heat Templates.
The impact of CVE-2015-5271 may allow remote attackers to obtain sensitive information due to improper middleware ordering.
There is no specific workaround documented for CVE-2015-5271; the recommended action is to apply the available patch.