Bug 1272297 (CVE-2015-5303)

Summary: CVE-2015-5303 python-rdomanager-oscplugin: NeutronMetadataProxySharedSecret parameter uses default value
Product: [Other] Security Response Reporter: Summer Long <slong>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, chrisw, dallan, gkotton, gmollett, hbrock, jjoyce, jschluet, jslagle, kbasil, lars, lhh, lpeer, markmc, mburns, rbryant, rhel-osp-director-maint, rhos-maint, sclewis, security-response-team, slinaber, tdecacqu, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was discovered that Director's NeutronMetadataProxySharedSecret parameter remained specified at the default value of 'unset'. This value is used by OpenStack Networking to sign instance headers; if unchanged, an attacker knowing the shared secret could use this flaw to spoof OpenStack Networking metadata requests.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-04-08 00:23:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1269786, 1295289, 1295291, 1295337    
Bug Blocks: 1272303    

Description Summer Long 2015-10-16 02:40:41 UTC
Steven Hardy reports: Currently we don't set the NeutronMetadataProxySharedSecret, (which according to the description in the neutron docs exists to prevent spoofing) - thus is remains at it's bad default value of "unset".

I assume this has the potential for security impact given that if it's predictable I guess spoofing metadata requests then becomes possible, but not being a Neutron expert I'm not sure of how serious an issue this may be.

Comment 1 Summer Long 2015-11-10 01:04:37 UTC
Acknowledgements:

This issue was discovered by Steven Hardy of Red Hat.

Comment 2 Summer Long 2015-12-09 03:55:41 UTC
Upstream: https://bugs.launchpad.net/tripleo/+bug/1516027

Comment 3 errata-xmlrpc 2015-12-21 16:51:51 UTC
This issue has been addressed in the following products:

  OpenStack 7.0 Director/Manager for RHEL 7

Via RHSA-2015:2650 https://access.redhat.com/errata/RHSA-2015:2650