[Openstack-security] [Bug 1554288] Re: [FG-VD-16-015] Openstack Glance Authenticated User DoS Vulnerability Notification
Travis McPeak
tmcpeak at us.ibm.com
Tue Mar 29 20:19:29 UTC 2016
Sorry I'm playing catch up a bit here but UUID collision definitely
should be infeasible. Also image creation for non-admin users should be
subject to quotas, correct?
--
You received this bug notification because you are a member of OpenStack
Security, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1554288
Title:
[FG-VD-16-015] Openstack Glance Authenticated User DoS Vulnerability
Notification
Status in Glance:
New
Status in OpenStack Security Advisory:
Won't Fix
Bug description:
Vulnerability Notification
March 7, 2016
Tracking Case #: FG-VD-16-015
Dear Openstack,
The following information pertains to information discovered by
Fortinet's FortiGuard Labs. It has been determined that a
vulnerability exists in Openstack Glance module. To streamline the
disclosure process, we have created a preliminary advisory which you
can find below. This upcoming advisory is purely intended as a
reference, and does not contain sensitive information such as proof of
concept code.
As a mature corporation involved in security research, we strive to
responsibly disclose vulnerability information. We will not post an
advisory until we determine it is appropriate to do so in co-
ordination with the vendor unless a resolution cannot be reached. We
will not disclose full proof of concept, only details relevant to the
advisory.
We look forward to working closely with you to resolve this issue, and
kindly ask for your co-operation during this time. Please let us know
if you have any further questions, and we will promptly respond to
address any issues.
If this message is not encrypted, it is because we could not find your
key to do so. If you have one available for use, please notify us and
we will ensure that this is used in future correspondence. We ask you
use our public PGP key to encrypt and communicate any sensitive
information with us. You may find the key on our FortiGuard center at:
http://www.fortiguard.com/pgp_key.html.
Type of Vulnerability & Repercussions:
DoS
Affected Software:
Ubuntu 14.04.3 with latest repository installed
# apt-get install software-properties-common
# add-apt-repository cloud-archive:liberty
Upcoming Advisory Reference:
http://www.fortiguard.com/advisory/UpcomingAdvisories.html
Credits:
This vulnerability was discovered by Fortinet's FortiGuard Labs.
Proof of Concept/How to Reproduce:
1. Run script "sh curl_get_token_demo_work.txt" to get a valid non-admin or admin user token. Need to replace "tenantName", "username", "password" with your Openstack credential.
2. Open script glance_DoS.py, and replace the line 30 "x-auth-token" value with the above token value, also replace the IP in url "http://10.0.0.11:9191/images" with your Openstack control node IP address.
3. Run script glance_DoS.py which will keep running forever. You can check the images added by the script using console command "glance image-list" or clicking Dashboard images column. You will notice you cannnot delete the images added by the script. It prompts failure. Refer to the screenshots glance_cli_delete_fail.png and dashboard_delete_garbage_image_fail.png.
4. Because either non-admin or admin user cannot delete the garbage images, with the above PoC running forever, more and more garbage images are added. So finally DoS can be caused because resource is exhausted or glance database query is very very slow.
Notes:
1) Run the PoC glance_DoS.py in Windows 7.
Additional Information:
To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1554288/+subscriptions
More information about the Openstack-security
mailing list