Bug 1112945 (CVE-2014-4615) - CVE-2014-4615 pycadf: token leak to message queue
Summary: CVE-2014-4615 pycadf: token leak to message queue
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-4615
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1112947 1112948 1112949 1113373 1113374 1113375 1113376 1113377 1113378 1126310
Blocks: 1112950
TreeView+ depends on / blocked
 
Reported: 2014-06-25 05:52 UTC by Murray McAllister
Modified: 2021-02-17 06:27 UTC (History)
32 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that authentication tokens were not properly sanitized from the message queue by the notifier middleware. An attacker with read access to the message queue could possibly use this flaw to intercept an authentication token and gain elevated privileges. Note that all services using the notifier middleware configured after the auth_token middleware pipeline were affected.
Clone Of:
Environment:
Last Closed: 2014-08-13 02:06:12 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1050 0 normal SHIPPED_LIVE Important: openstack-ceilometer security and bug fix update 2014-08-13 05:36:01 UTC

Description Murray McAllister 2014-06-25 05:52:29 UTC
The OpenStack project reports:

""
Title: User token leak to message queue in pyCADF notifier middleware
Reporter: Zhi Kun Liu (IBM)
Products: Neutron    (2014.1 versions up to 2014.1.1)
          Ceilometer (2013.2 versions up to 2013.2.3,
                      2014.1 versions up to 2014.1.1)
          pyCADF library (all versions up to 0.5.0)

Description:
Zhi Kun Liu from IBM reported a vulnerability in the notifier middleware
available in the PyCADF library and formerly copied into Neutron and
Ceilometer code. An attacker with read access to the message queue may
obtain authentication tokens used in REST requests (X_AUTH_TOKEN) that
goes through the notifier middleware. All services using the notifier
middleware configured after the auth_token middleware pipeline are impacted.
""

Comment 2 Murray McAllister 2014-06-25 05:57:42 UTC
Created openstack-ceilometer tracking bugs for this issue:

Affects: fedora-all [bug 1112949]

Comment 3 Murray McAllister 2014-06-25 05:57:48 UTC
Created python-pycadf tracking bugs for this issue:

Affects: fedora-20 [bug 1112947]

Comment 4 Ihar Hrachyshka 2014-06-25 10:52:13 UTC
How about RHOSP 5 tracker bugs?

Comment 8 Garth Mollett 2014-06-26 04:59:43 UTC
(In reply to Ihar Hrachyshka from comment #4)
> How about RHOSP 5 tracker bugs?

Done.

Comment 11 Martin Prpič 2014-08-11 11:45:58 UTC
IssueDescription:

It was found that authentication tokens were not properly sanitized from the message queue by the notifier middleware. An attacker with read access to the message queue could possibly use this flaw to intercept an authentication token and gain elevated privileges. Note that all services using the notifier middleware configured after the auth_token middleware pipeline were affected.

Comment 12 errata-xmlrpc 2014-08-13 01:36:12 UTC
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:1050 https://rhn.redhat.com/errata/RHSA-2014-1050.html


Note You need to log in before you can comment on or make changes to this bug.