The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2 allows remote attackers to obtain the DRBD secret via instance information job results.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8 | release notes vendor advisory |
http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6 | release notes vendor advisory |
http://www.debian.org/security/2016/dsa-3431 | vendor advisory |
http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3 | release notes vendor advisory |
http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2 | release notes vendor advisory |
http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html | vdb entry third party advisory patch |
https://www.exploit-db.com/exploits/39169/ | exploit |
http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7 | release notes vendor advisory |
http://www.ocert.org/advisories/ocert-2015-012.html | vdb entry third party advisory patch |
http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8 | release notes vendor advisory |
http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2 | release notes vendor advisory |