Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/54277 | vdb entry |
http://secunia.com/advisories/49763 | third party advisory vendor advisory |
https://bugs.launchpad.net/nova/+bug/1015531 | |
http://secunia.com/advisories/49802 | third party advisory vendor advisory |
https://lists.launchpad.net/openstack/msg14089.html | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html | vendor advisory |
https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7 | |
https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9 | patch exploit |
http://www.ubuntu.com/usn/USN-1497-1 | vendor advisory |