First published: Mon Sep 10 2018(Updated: )
The OpenStack RabbitMQ container image insecurely retrieves the rabbitmq_clusterer component over HTTP during the build stage. This could potentially allow an attacker to serve malicious code to the image builder and install in the resultant container image. Version of openstack-rabbitmq-container and openstack-containers as shipped with Red Hat Openstack 12, 13, 14 are believed to be vulnerable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack | =12 | |
Redhat Openstack | =13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14620 is considered a high-severity vulnerability due to the potential for attackers to serve malicious code during the build stage.
To fix CVE-2018-14620, ensure that the OpenStack RabbitMQ container image retrieves components using secure HTTP (HTTPS) instead of HTTP.
CVE-2018-14620 affects Red Hat OpenStack versions 12 and 13.
The impact of CVE-2018-14620 includes the risk of installing harmful software in the resultant container image.
Yes, CVE-2018-14620 specifically highlights a vulnerability in the container image build process affecting security.