[Openstack-security] [Bug 1534288] Re: keystoneclient should not be using pickle
Tristan Cacqueray
tdecacqu at redhat.com
Tue Jan 19 16:40:33 UTC 2016
I've removed the privacy settings and put the OSSA tasks as Won't Fix
based on above comments. This can be put back to incomplete if the
situation changes.
** Description changed:
- This issue is being treated as a potential security risk under embargo.
- Please do not make any public mention of embargoed (private) security
- vulnerabilities before their coordinated publication by the OpenStack
- Vulnerability Management Team in the form of an official OpenStack
- Security Advisory. This includes discussion of the bug or associated
- fixes in public forums such as mailing lists, code review systems and
- bug trackers. Please also avoid private disclosure to other individuals
- not already approved for access to this information, and provide this
- same reminder to those who are made aware of the issue prior to
- publication. All discussion should remain confined to this private bug
- report, and any proposed fixes should be added to the bug as
- attachments.
-
- --
-
keystoneclient uses pickle to pull the keystoneclient_auth value out of
the keyring. pickle is not safe to use since it can run commands as the
user. I guess someone could use this to run some code as the nova user
by putting something into the keystoneclient_auth value in the nova
user's keyring and then getting nova to use keystoneclient.httpclient.
There's probably a safer way to do serialize the auth info using JSON or
some other format.
Opening this as private security since there's a potential attack here
although I don't have any proof.
This was found using bandit 0.17.0.
** Tags added: security
** Changed in: ossa
Status: Incomplete => Won't Fix
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of OpenStack
Security, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1534288
Title:
keystoneclient should not be using pickle
Status in OpenStack Security Advisory:
Won't Fix
Status in python-keystoneclient:
New
Bug description:
keystoneclient uses pickle to pull the keystoneclient_auth value out
of the keyring. pickle is not safe to use since it can run commands as
the user. I guess someone could use this to run some code as the nova
user by putting something into the keystoneclient_auth value in the
nova user's keyring and then getting nova to use
keystoneclient.httpclient.
There's probably a safer way to do serialize the auth info using JSON
or some other format.
Opening this as private security since there's a potential attack here
although I don't have any proof.
This was found using bandit 0.17.0.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ossa/+bug/1534288/+subscriptions
More information about the Openstack-security
mailing list