An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://launchpad.net/bugs/1996188 | patch exploit third party advisory issue tracking |
https://security.openstack.org/ossa/OSSA-2023-002.html | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00040.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/01/msg00041.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/01/msg00042.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5336 | third party advisory vendor advisory |
https://www.debian.org/security/2023/dsa-5338 | third party advisory vendor advisory |
https://www.debian.org/security/2023/dsa-5337 | third party advisory vendor advisory |