[openstack-announce] [OSSA 2014-021] User token leak to message queue in pyCADF notifier middleware (CVE-2014-4615)

Tristan Cacqueray tristan.cacqueray at enovance.com
Wed Jun 25 19:12:47 UTC 2014

OpenStack Security Advisory: 2014-021
CVE: CVE-2014-4615
Date: June 25, 2014
Title: User token leak to message queue in pyCADF notifier middleware
Reporter: Zhi Kun Liu (IBM)
Products: Neutron    (2014.1 versions up to 2014.1.1)
          Ceilometer (2013.2 versions up to 2013.2.3,
                      2014.1 versions up to 2014.1.1)
          pyCADF library (all versions up to 0.5.0)

Zhi Kun Liu from IBM reported a vulnerability in the notifier middleware
available in the PyCADF library and formerly copied into Neutron and
Ceilometer code. An attacker with read access to the message queue may
obtain authentication tokens used in REST requests (X_AUTH_TOKEN) that
goes through the notifier middleware. All services using the notifier
middleware configured after the auth_token middleware pipeline are impacted.

pyCADF fix (included in 0.5.1 release):
https://review.openstack.org/94878      (pyCADF)

Juno (development branch) fix:
https://review.openstack.org/94891      (Neutron)

Icehouse fix:
https://review.openstack.org/101097     (Neutron)
https://review.openstack.org/96944      (Ceilometer)

Havana fix:
https://review.openstack.org/101799     (Ceilometer)

Ceilometer Juno (master) branch is not affected.
Those fixes will be included in the Juno-2 development milestone and in
future 2013.2.4 and 2014.1.2 releases.


Tristan Cacqueray
OpenStack Vulnerability Management Team

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 538 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack-announce/attachments/20140625/7923f9d1/attachment.pgp>

More information about the OpenStack-announce mailing list