Safety vulnerability ID: 37192
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. See: CVE-2019-3895.
Latest version: 15.0.0
OpenStack Octavia Scalable Load Balancer as a Service
An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.
CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3895: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3895
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application