First published: Mon Apr 01 2019(Updated: )
### Description An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. ### Mitigation To prevent this vulnerability: 1. Update Octavia's configuration setting (octavia.conf) to `amp_image_owner_id = $UUID_OF_SERVICE_PROJECT` on all Octavia nodes. 2. Enable the new configuration by restarting both `octavia_worker` and `octavia_health_manager`.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-tripleo-common-8.6.8 | <9 | 9 |
redhat/openstack-tripleo-common-9.5.0 | <5 | 5 |
pip/octavia | <0.9.0 | 0.9.0 |
OpenStack Octavia | <0.9.0 | |
redhat openstack | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3895 is classified as a high severity vulnerability due to its access-control flaw in the Octavia service.
To fix CVE-2019-3895, upgrade to the recommended versions of the affected packages as specified in Red Hat's advisories.
CVE-2019-3895 affects openstack-tripleo-common versions up to 9, octavia versions up to 0.9.0, and specific versions of Red Hat OpenStack.
An attacker could exploit CVE-2019-3895 to upload and run arbitrary amphorae images in the Octavia service.
The OpenStack components impacted by CVE-2019-3895 primarily include the Octavia service and the Red Hat OpenStack Platform.