A flaw was found in instack-undercloud 7.2.0 as packaged in Red Hat OpenStack Platform Pike, 6.1.0 as packaged in Red Hat OpenStack Platform Oacta, 5.3.0 as packaged in Red Hat OpenStack Newton, where pre-install and security policy scripts used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:2726 | vendor advisory |
http://www.securityfocus.com/bid/100407 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:2649 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2687 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2557 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2693 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1477403 | issue tracking vendor advisory |