Description
The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.
CVSS vector
AV:N/AC:L/C:P/I:P/A:NExploitability: 10.0 | Impact: 4.9Complexity: Low
Availability: None
Affected Packages3 packages
🔴Vulnerability Details
4GHSAOpenStack Compute Nova Improper Access Control↗2022-05-17 ▶ OSVOpenStack Compute Nova Improper Access Control↗2022-05-17 ▶ OSVCVE-2013-4497: The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013↗2013-11-05 ▶ CVEListCVE-2013-4497: The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013↗2013-11-05 ▶ 📋Vendor Advisories
2DebianCVE-2013-4497: nova - The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana befor...↗2013 ▶ Red Hatopenstack-nova: XenAPI security groups not kept through migrate or resize↗2012-10-30 ▶ 💬Community
2BugzillaCVE-2013-4497 openstack-nova: XenAPI security groups not kept through migrate or resize [fedora-all]↗2013-11-04 ▶ BugzillaCVE-2013-4497 openstack-nova: XenAPI security groups not kept through migrate or resize↗2013-11-04 ▶