First published: Mon Dec 27 2021(Updated: )
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Tripleo Heat Templates | <11.6.1 | |
Redhat Openstack | =13 | |
Redhat Openstack | =16.1 | |
Redhat Openstack | =16.2 | |
redhat/openstack-tripleo-heat-templates | <11.6.1 | 11.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4180 is an information exposure flaw in openstack-tripleo-heat-templates that allows an external user to discover the internal IP or hostname.
An attacker can exploit CVE-2021-4180 by checking the www_authenticate_uri parameter in configuration files.
The severity of CVE-2021-4180 is medium with a CVSS score of 4.3.
Openstack Tripleo Heat Templates 11.6.1, Redhat Openstack 13, Redhat Openstack 16.1, Redhat Openstack 16.2, and Redhat Openstack tripleo-heat-templates package version 11.6.1 are affected by CVE-2021-4180.
To fix CVE-2021-4180, update to a version of openstack-tripleo-heat-templates that is higher than 11.6.1.