A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-2627 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 8.2 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 11.0 (Ocata) | openstack-tripleo-common | Will not fix |
Red Hat OpenStack Platform 10 | openstack-tripleo-common | Will not fix |
OpenStack 9.0 Director for RHEL 7 | openstack-tripleo-common | Not affected |
OpenStack 8.0 Director for RHEL 7 | openstack-tripleo-common | Not affected |
OpenStack 7.0 Director for RHEL 7 | openstack-tripleo-common | Not affected |