[Openstack-security] [Bug 1378172] Re: Insecure tmp file creation in python-muranoclient
Jeremy Stanley
fungi at yuggoth.org
Fri Oct 2 12:21:00 UTC 2015
The offending code seems to have been replaced months ago as a side
effect of https://review.openstack.org/204048 (so fixed in 0.6.3), and
was originally introduced in 8468a03 which first appeared in the 0.5.3
release.
--
You received this bug notification because you are a member of OpenStack
Security, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1378172
Title:
Insecure tmp file creation in python-muranoclient
Status in python-muranoclient:
Confirmed
Bug description:
./python-muranoclient/muranoclient/v1/shell.py:258:
archive_name = args.output or tempfile.mktemp(prefix="murano_")
try:
if args.template:
directory_path = hot_package.prepare_package(args)
else:
directory_path = mpl_package.prepare_package(args)
archive_name = args.output or
tempfile.mktemp(prefix="murano_")
_make_archive(archive_name, directory_path)
print("Application package is available at " +
os.path.abspath(archive_name))
this is highly insecure and allows an attacker to modify the contents of the archive, assuming no arg name was passed. This code does not appear to be used, but is still CVE worthy as the code may be used (ref: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1692). Exploitation of this vuln would appear to lead to code execution (e.g. modify the archive package which is then used while deploying systems).
To manage notifications about this bug go to:
https://bugs.launchpad.net/python-muranoclient/+bug/1378172/+subscriptions
More information about the Openstack-security
mailing list