ossa/ossa/OSSA-2015-002.yaml

62 lines
1.5 KiB
YAML

date: 2015-01-15
id: OSSA-2015-002
title: 'Glance v2 API unrestricted path traversal through filesystem:// scheme'
description: 'Jin Liu from EMC reported that path traversal vulnerabilities in Glance
were not fully patched in OSSA 2014-041. By setting a malicious image
location to a filesystem:// scheme an authenticated user can still
download or delete any file on the Glance server for which the Glance
process user has access to. Only setups using the Glance V2 API are
affected by this flaw.'
errata: 'When the original advisory was published a CVE number was not assigned.
CVE-2015-1195 can now be used to track this vulnerability.'
affected-products:
- product: glance
version: up to 2014.1.3 and 2014.2 versions up to 2014.2.1
vulnerabilities:
- cve-id: CVE-2015-1195
reporters:
- name: 'Jin Liu'
affiliation: EMC
reported:
- CVE-2015-1195
issues:
links:
- https://launchpad.net/bugs/1408663
type: launchpad
reviews:
kilo:
- https://review.openstack.org/145640
juno:
- https://review.openstack.org/145916
icehouse:
- https://review.openstack.org/145974
type: gerrit
notes:
- 'This fix was included in the kilo-1 development milestone and will be included
in future 2014.2.2 (juno) and 2014.1.4 (icehouse) releases.'
- 'The OpenStack VMT recommends revoking all credentials stored in files
accessible by Glance as a precautionary measure.'
errata_history:
- 2015-01-19 - Errata 1
- 2015-01-15 - Original Version