Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Metal_as_a_service | Canonical | 3.1.0 (including) | 3.1.4 (excluding) |
Metal_as_a_service | Canonical | 3.2.0 (including) | 3.2.11 (excluding) |
Metal_as_a_service | Canonical | 3.3.0 (including) | 3.3.8 (excluding) |
Metal_as_a_service | Canonical | 3.4.0 (including) | 3.4.4 (excluding) |
Metal_as_a_service | Canonical | 3.5.0 (including) | 3.5.0 (including) |
Maas | Ubuntu | focal | * |