First published: Fri Nov 02 2018(Updated: )
A flaw was found in openstack-mistral. By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack-mistral | <7.0.1 | |
pip/mistral | <7.0.1 | 7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16849 is high.
The affected software of CVE-2018-16849 is Redhat Openstack-mistral version up to exclusive 7.0.1.
CVE-2018-16849 can be exploited by manipulating the SSH private key filename to disclose arbitrary files within the filesystem of the executor running the action.
Yes, here are the references for CVE-2018-16849: [1] https://bugs.launchpad.net/mistral/+bug/1783708 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16849
The CWE of CVE-2018-16849 is CWE-200.