First published: Tue Oct 08 2019(Updated: )
Amphora Images in OpenStack Octavia >=0.10.0 <2.1.2, >=3.0.0 <3.2.0, >=4.0.0 <4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent on port https/9443, because the `cmd/agent.py` gunicorn cert_reqs option is True but is supposed to be ssl.CERT_REQUIRED.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-octavia | <2.1.2-1.el7 | 2.1.2-1.el7 |
redhat/openstack-octavia-4.1.0 | <1 | 1 |
pip/octavia | >=4.0.0<4.1.0 | 4.1.0 |
pip/octavia | >=3.0.0<3.2.0 | 3.2.0 |
pip/octavia | >=0.10.0<2.1.2 | 2.1.2 |
debian/octavia | 7.1.0-2 11.0.0-2 14.0.0-4 | |
OpenStack Octavia | >=0.10.0<2.1.2 | |
OpenStack Octavia | >=3.0.0<3.2.0 | |
OpenStack Octavia | >=4.0.0<4.1.0 | |
Ubuntu Linux | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17134 has a high severity due to its potential to allow unauthorized access to sensitive configurations and information.
To fix CVE-2019-17134, upgrade OpenStack Octavia to version 2.1.2 or later, or to a version above 3.2.0 or 4.1.0.
CVE-2019-17134 affects OpenStack Octavia versions between 0.10.0 and 2.1.2, as well as versions from 3.0.0 to 3.2.0, and from 4.0.0 to 4.1.0.
There is no documented workaround for CVE-2019-17134, and it is strongly recommended to apply updates.
The exploitation of CVE-2019-17134 can lead to unauthorized actions performed on the Octavia Agent, compromising the security of the OpenStack deployment.