7.5
CVSSv2

CVE-2016-4972

Published: 26/09/2016 Updated: 28/09/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenStack Murano prior to 1.0.3 (liberty) and 2.x prior to 2.0.1 (mitaka), Murano-dashboard prior to 1.0.3 (liberty) and 2.x prior to 2.0.1 (mitaka), and python-muranoclient prior to 0.7.3 (liberty) and 0.8.x prior to 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote malicious users to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

Vulnerable Product Search on Vulmon Subscribe to Product

openstack murano

openstack mitaka-murano

openstack python-muranoclient

openstack murano-dashboard

Vendor Advisories

Debian Bug report logs - #828062 murano: CVE-2016-4972: RCE vulnerability in Openstack Murano using insecure YAML tags Package: src:murano; Maintainer for src:murano is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 24 Jun 2016 15:09:02 UTC Sever ...
A flaw was discovered in openstack-murano processing Using extended YAML tags in Murano-application YAML files, an attacker could perform remote code execution ...