CVE-2013-2030Initialization of a Resource with an Insecure Default in Compute

Severity
2.1LOWNVD
EPSS
0.0%
top 89.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateMay 17

Description

keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.

CVSS vector

AV:L/AC:L/C:N/I:P/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

NVDopenstack/havanahavana-1, havana-2, havana-3+2
NVDopenstack/grizzly2013.1
NVDopenstack/compute4 versions+3

Patches

🔴Vulnerability Details

3
OSV
OpenStack Nova uses insecure keystone middleware tmpdir by default2022-05-17
GHSA
OpenStack Nova uses insecure keystone middleware tmpdir by default2022-05-17
CVEList
CVE-2013-2030: keystone/middleware/auth_token2013-12-27

📋Vendor Advisories

1
Debian
CVE-2013-2030: nova - keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana ...2013

💬Community

3
Bugzilla
CVE-2013-2030 OpenStack nova: insecure directory creation for signing [epel-6]2013-05-10
Bugzilla
CVE-2013-2030 OpenStack nova: insecure directory creation for signing [fedora-all]2013-05-10
Bugzilla
CVE-2013-2030 OpenStack nova: insecure directory creation for signing2013-04-30
CVE-2013-2030 — Openstack Compute vulnerability | cvebase