A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Novajoin | Python | * | 1.1.1 (excluding) |
Red Hat OpenStack Platform 13.0 (Queens) | RedHat | python-novajoin-0:1.1.1-3.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | ansible-role-container-registry-0:1.0.1-0.20190218212245.d6a749a.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | ansible-role-redhat-subscription-0:1.0.2-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | ansible-role-tripleo-modify-image-0:1.0.1-0.20190226052419.9014df9.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | ansible-tripleo-ipsec-0:9.1.0-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-barbican-0:7.0.1-0.20190204192112.ed17b57.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-designate-1:7.0.1-0.20190314164436.7f4c878.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-heat-ui-0:1.4.1-0.20190130023741.0b301df.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-kuryr-kubernetes-0:0.5.4-0.20190220170509.17d2635.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-manila-1:7.1.0-2.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-manila-ui-0:2.16.1-0.20190204170113.4865df2.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-octavia-ui-0:2.0.1-0.20190110112807.85e4a3e.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-selinux-0:0.8.18-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-tempest-1:19.0.0-3.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openstack-zaqar-1:7.0.1-0.20181026065336.fed6d77.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | openvswitch2.10-0:2.10.0-28.el7fdp.2 | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-glance-store-0:0.26.2-0.20181026221750.d001c3c.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-hardware-0:0.18.1-0.20190301121902.b417976.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-novajoin-0:1.1.1-2.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-octaviaclient-0:1.6.0-0.20180816134808.64d007f.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-os-faults-0:0.2.1-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-oslo-cache-0:1.30.3-0.20190204170706.5f42092.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-ovsdbapp-0:0.12.3-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-telemetry-tests-tempest-0:0.2.0-0.20190222195250.7f0e315.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-vmware-nsxlib-0:13.0.1-0.20190220070404.24a7ff4.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | python-wsme-0:0.9.4-0.20190314161310.1d73d6e.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | qpid-proton-0:0.26.0-3.el7 | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | rhosp-release-0:14.0.2-1.el7ost | * |
Red Hat OpenStack Platform 14.0 (Rocky) | RedHat | skydive-0:0.20.3-1.el7ost | * |
Access control involves the use of several protection mechanisms such as:
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: