Improper handling of ScaleIO backend credentials When using Cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This enables an end user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project Upstream bug: https://bugs.launchpad.net/cinder/+bug/1823200
Acknowledgments: Name: David Hill (Red Hat), Eric Harney (Red Hat)
External References: https://wiki.openstack.org/wiki/OSSN/OSSN-0086
Created openstack-cinder tracking bugs for this issue: Affects: openstack-rdo [bug 1844948]
Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
*** Bug 1845179 has been marked as a duplicate of this bug. ***
Statement: In addition to the software updates for this flaw, you must deploy a new configuration file on compute nodes, cinder nodes, and anywhere you would perform a volume attachment in your deployment. For detailed information, refer to referenced article.
How about this patch that is related to python version? https://review.opendev.org/#/c/735989
@Rajini: I updated the Fixed In Version to reflect the versions containing the followup patch. (Note: all os-brick versions have been released; Ussuri was not affected; train cinder has been released, but stein cinder (14.2.0) is held up by gate problems; will hopefully be released later this week.)
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2020:4283 https://access.redhat.com/errata/RHSA-2020:4283
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:4391 https://access.redhat.com/errata/RHSA-2020:4391
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-10755