oss-sec mailing list archives

Re: Re: [OSSA 2012-017] Authentication bypass for image deletion (CVE-2012-4573)


From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 09 Nov 2012 00:52:34 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/08/2012 03:52 PM, Russell Bryant wrote:
On 11/07/2012 05:10 PM, Russell Bryant wrote:
OpenStack Security Advisory: 2012-017 CVE: CVE-2012-4573 Date:
November 7, 2012 Title: Authentication bypass for image deletion 
Impact: High Reporter: Gabe Westmaas (Rackspace) Products:
Glance Affects: Essex, Folsom, Grizzly

Description: Gabe Westmaas from Rackspace reported a
vulnerability in Glance authentication of image deletion
requests. Authenticated users may be able to delete arbitrary,
non-protected images from Glance servers. Only Folsom/Grizzly
deployments that expose the v1 API are affected by this 
vulnerability. Additionally, Essex deployments that use the 
delayed_delete option are also affected.

Fixes: Grizzly: 
https://github.com/openstack/glance/commit/6ab0992e5472ae3f9bef0d2ced41030655d9d2bc


2012.2 (Folsom):
https://github.com/openstack/glance/commit/90bcdc5a89e350a358cf320a03f5afe99795f6f6


2012.1 (Essex): https://review.openstack.org/#/c/15562/

References: 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4573 
https://bugs.launchpad.net/glance/+bug/1065187

Notes: This fix will be included in the grizzly-1 development
milestone and in a future 2012.2 (Folsom) release.


There have been some important updates that have occurred since
the publication of this advisory:

1) When the advisory was published, the patch for the stable/essex 
branch had not been merged.  It has now been merged and is
*different* than the original patch.  If you pulled the earlier
patch, please update to the final version.

https://github.com/openstack/glance/commit/efd7e75b1f419a52c7103c7840e24af8e5deb29d

 2) It was discovered that the patches submitted for stable/folsom
and master (grizzly) did not completely solve the problem.  The
original patch only fixed the problem for the v1 API.  The problem
still existed for the v2 API.  Please see this commit for the
additional patch:

bug: https://bugs.launchpad.net/glance/+bug/1076506

stable/folsom: 
https://github.com/openstack/glance/commit/fc0ee7623ec59c87ac6fc671e95a9798d6f2e2c3

 master: 
https://github.com/openstack/glance/commit/b591304b8980d8aca8fa6cda9ea1621aca000c88

This

needs a new CVE since the previous one wasn't fully fixed in the
patches.  Please use CVE-2012-5482 for this new/updated fix.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=3rlD
-----END PGP SIGNATURE-----


Current thread: