[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-2654

Date: (C)2012-06-21   (M)2017-08-29
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions.

Reference:
SECUNIA-46808
SECUNIA-49439
USN-1466-1
https://lists.launchpad.net/openstack/msg12883.html
https://bugs.launchpad.net/nova/+bug/985184
https://github.com/openstack/nova/commit/9f9e9da777161426a6f8cb4314b78e09beac2978
https://github.com/openstack/nova/commit/ff06c7c885dc94ed7c828e8cdbb8b5d850a7e654
https://review.openstack.org/#/c/8239/
nova-security-group-sec-bypass(76110)

CPE    3
cpe:/a:openstack:diablo:2011.3
cpe:/a:openstack:essex:2012.1
cpe:/a:openstack:compute:2012.2
CWE    1
CWE-20
OVAL    8
oval:org.secpod.oval:def:103934
oval:org.secpod.oval:def:103993
oval:org.secpod.oval:def:103942
oval:org.secpod.oval:def:103991
...

© 2013 SecPod Technologies