First published: Mon Sep 26 2016(Updated: )
OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-muranoclient | >=0.8.0<0.8.5 | 0.8.5 |
pip/murano-dashboard | >=2.0.0<2.0.1 | 2.0.1 |
pip/python-muranoclient | <0.7.3 | 0.7.3 |
pip/murano-dashboard | <1.0.3 | 1.0.3 |
pip/murano | <1.0.3 | 1.0.3 |
OpenStack Mitaka-Murano | <=2.0.0 | |
OpenStack Mitaka-Murano | <=1.0.2 | |
OpenStack Murano Dashboard | <=1.0.2 | |
OpenStack Python Muranoclient | <=0.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4972 has been classified as a moderate severity vulnerability due to potential unauthorized code execution risks.
To fix CVE-2016-4972, upgrade Murano to version 1.0.3, Murano-dashboard to version 1.0.3, and python-muranoclient to version 0.8.5 or later.
CVE-2016-4972 affects OpenStack Murano versions prior to 1.0.3, Murano-dashboard versions prior to 1.0.3, and python-muranoclient versions prior to 0.7.3.
The consequences of CVE-2016-4972 include the risk of attackers executing arbitrary code within the OpenStack environment.
There is no official workaround for CVE-2016-4972; the only solution is to upgrade to the patched versions.