First published: Tue Oct 08 2019(Updated: )
Amphora Images in OpenStack Octavia >=0.10.0 <2.1.2, >=3.0.0 <3.2.0, >=4.0.0 <4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent on port https/9443, because the `cmd/agent.py` gunicorn cert_reqs option is True but is supposed to be ssl.CERT_REQUIRED.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opendev Octavia | >=0.10.0<2.1.2 | |
Opendev Octavia | >=3.0.0<3.2.0 | |
Opendev Octavia | >=4.0.0<4.1.0 | |
Canonical Ubuntu Linux | =19.04 | |
redhat/openstack-octavia | <2.1.2-1.el7 | 2.1.2-1.el7 |
redhat/openstack-octavia-4.1.0 | <1 | 1 |
pip/octavia | >=4.0.0<4.1.0 | 4.1.0 |
pip/octavia | >=3.0.0<3.2.0 | 3.2.0 |
pip/octavia | >=0.10.0<2.1.2 | 2.1.2 |
debian/octavia | 7.1.0-2 11.0.0-2 14.0.0-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.