Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-44021

Опубликовано: 08 мая 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.

A flaw was found in Ironic. It did not filter file:// paths when used as an image source except to ensure they were a file. This issue could cause config files from well-known paths to be written to disk on a node.

Отчет

This is rated as a moderate vulnerability because it requires pre-existing privileged access to Ironic’s API or configuration to exploit. While misuse of file:// paths could expose sensitive host files by writing them to provisioned nodes, the flaw does not enable code execution or privilege escalation on the host. Its impact is limited to information disclosure during provisioning, and secure deployments typically restrict file:// usage or isolate Ironic’s file access, further reducing the risk.

Меры по смягчению последствий

Currently, no mitigation is available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openstack-ironicFix deferred
Red Hat OpenStack Platform 16.2openstack-ironicFix deferred
Red Hat OpenStack Platform 17.1openstack-ironicFix deferred
Red Hat OpenStack Platform 18.0openstack-ironicFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-427
https://bugzilla.redhat.com/show_bug.cgi?id=2364264openstack-ironic: unsafe image file:// paths

EPSS

Процентиль: 2%
0.00014
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 2.8
ubuntu
около 1 месяца назад

OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.

CVSS3: 2.8
nvd
около 1 месяца назад

OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.

CVSS3: 2.8
debian
около 1 месяца назад

OpenStack Ironic before 29.0.1 can write unintended files to a target ...

CVSS3: 2.8
github
около 1 месяца назад

OpenStack Ironic fails to restrict paths used for file:// image URLs

EPSS

Процентиль: 2%
0.00014
Низкий

5.4 Medium

CVSS3