Amphora Images in OpenStack Octavia >=0.10.0 <2.1.2, >=3.0.0 <3.2.0, >=4.0.0 <4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent on port https/9443, because the cmd/agent.py gunicorn cert_reqs option is True but is supposed to be ssl.CERT_REQUIRED.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://storyboard.openstack.org/#%21/story/2006660 | |
https://review.opendev.org/686547 | mailing list third party advisory patch |
https://review.opendev.org/686546 | mailing list third party advisory patch |
https://review.opendev.org/686545 | mailing list third party advisory patch |
https://review.opendev.org/686544 | mailing list third party advisory patch |
https://review.opendev.org/686543 | mailing list third party advisory patch |
https://review.opendev.org/686541 | mailing list third party advisory patch |
https://security.openstack.org/ossa/OSSA-2019-005.html | patch vendor advisory |
https://usn.ubuntu.com/4153-1/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3743 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3788 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0721 | vendor advisory |