The OpenStack project reports:
Title: User token leak to message queue in pyCADF notifier middleware
Reporter: Zhi Kun Liu (IBM)
Products: Neutron (2014.1 versions up to 2014.1.1)
Ceilometer (2013.2 versions up to 2013.2.3,
2014.1 versions up to 2014.1.1)
pyCADF library (all versions up to 0.5.0)
Zhi Kun Liu from IBM reported a vulnerability in the notifier middleware
available in the PyCADF library and formerly copied into Neutron and
Ceilometer code. An attacker with read access to the message queue may
obtain authentication tokens used in REST requests (X_AUTH_TOKEN) that
goes through the notifier middleware. All services using the notifier
middleware configured after the auth_token middleware pipeline are impacted.
Created openstack-ceilometer tracking bugs for this issue:
Affects: fedora-all [bug 1112949]
Created python-pycadf tracking bugs for this issue:
Affects: fedora-20 [bug 1112947]
How about RHOSP 5 tracker bugs?
(In reply to Ihar Hrachyshka from comment #4)
> How about RHOSP 5 tracker bugs?
It was found that authentication tokens were not properly sanitized from the message queue by the notifier middleware. An attacker with read access to the message queue could possibly use this flaw to intercept an authentication token and gain elevated privileges. Note that all services using the notifier middleware configured after the auth_token middleware pipeline were affected.
This issue has been addressed in following products:
OpenStack 4 for RHEL 6
Via RHSA-2014:1050 https://rhn.redhat.com/errata/RHSA-2014-1050.html