Описание
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.
A flaw was found in Ironic. It did not filter file:// paths when used as an image source except to ensure they were a file. This issue could cause config files from well-known paths to be written to disk on a node.
Отчет
This is rated as a moderate vulnerability because it requires pre-existing privileged access to Ironic’s API or configuration to exploit. While misuse of file:// paths could expose sensitive host files by writing them to provisioned nodes, the flaw does not enable code execution or privilege escalation on the host. Its impact is limited to information disclosure during provisioning, and secure deployments typically restrict file:// usage or isolate Ironic’s file access, further reducing the risk.
Меры по смягчению последствий
Currently, no mitigation is available for this vulnerability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat OpenShift Container Platform 4 | openstack-ironic | Fix deferred | ||
Red Hat OpenStack Platform 16.2 | openstack-ironic | Fix deferred | ||
Red Hat OpenStack Platform 17.1 | openstack-ironic | Fix deferred | ||
Red Hat OpenStack Platform 18.0 | openstack-ironic | Fix deferred |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.
OpenStack Ironic before 29.0.1 can write unintended files to a target ...
OpenStack Ironic fails to restrict paths used for file:// image URLs
EPSS
5.4 Medium
CVSS3