CVE-2017-2627

A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2627 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:openstack:tripleo-common:-:*:*:*:*:*:*:*

History

04 Aug 2021, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:openstack:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:11.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

Information

Published : 2018-08-22 17:29

Updated : 2023-12-10 12:44


NVD link : CVE-2017-2627

Mitre link : CVE-2017-2627

CVE.ORG link : CVE-2017-2627


JSON object : View

Products Affected

redhat

  • openstack

openstack

  • tripleo-common
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')