OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, update, delete, or share resources that do not belong to them, because of a context-free lookup of a UUID. Attackers may also create resources, such as shared file systems and groups of shares on such share networks.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Manila | Openstack | * | 7.4.1 (excluding) |
Manila | Openstack | 8.0.0 (including) | 8.1.1 (excluding) |
Manila | Openstack | 9.0.0 (including) | 9.1.1 (excluding) |
Red Hat OpenStack Platform 13.0 (Queens) | RedHat | openstack-manila-1:6.3.2-3.el7ost | * |
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS | RedHat | openstack-manila-1:6.3.2-3.el7ost | * |
Red Hat OpenStack Platform 15.0 (Stein) | RedHat | openstack-manila-1:8.1.1-0.20200311070441.17b29e2.el8ost | * |
Red Hat OpenStack Platform 16.0 (Train) | RedHat | openstack-manila-1:9.1.2-0.20200405045746.f071a43.el8ost | * |
Manila | Ubuntu | bionic | * |
Manila | Ubuntu | eoan | * |
Manila | Ubuntu | esm-apps/bionic | * |
Manila | Ubuntu | esm-apps/xenial | * |
Manila | Ubuntu | trusty | * |
Manila | Ubuntu | upstream | * |
Manila | Ubuntu | xenial | * |