First published: Mon Apr 01 2019(Updated: )
### Description An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. ### Mitigation To prevent this vulnerability: 1. Update Octavia's configuration setting (octavia.conf) to `amp_image_owner_id = $UUID_OF_SERVICE_PROJECT` on all Octavia nodes. 2. Enable the new configuration by restarting both `octavia_worker` and `octavia_health_manager`.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Octavia | <0.9.0 | |
Redhat Openstack | =12 | |
redhat/openstack-tripleo-common-8.6.8 | <9 | 9 |
redhat/openstack-tripleo-common-9.5.0 | <5 | 5 |
pip/octavia | <0.9.0 | 0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.