CVE Vulnerabilities

CVE-2017-7200

Server-Side Request Forgery (SSRF)

Published: Mar 21, 2017 | Modified: Mar 30, 2017
CVSS 3.x
5.8
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW

An SSRF issue was discovered in OpenStack Glance before Newton. The copy_from feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as http://localhost:22. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

Name Vendor Start Version End Version
Glance Openstack * mitaka (including)
Glance Ubuntu esm-infra/xenial *
Glance Ubuntu precise *
Glance Ubuntu trusty *
Glance Ubuntu upstream *
Glance Ubuntu xenial *
Glance Ubuntu yakkety *

References