Lucene search

K
cve[email protected]CVE-2024-31463
HistoryApr 17, 2024 - 4:15 p.m.

CVE-2024-31463

2024-04-1716:15:08
CWE-288
web.nvd.nist.gov
27
openstack
ironic
vulnerability
reverse proxy
http basic credentials
metal3
deployment
api
authentication
tls
attacker
bios settings

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%

Ironic-image is an OpenStack Ironic deployment packaged and configured by Metal3. When the reverse proxy mode is enabled by the IRONIC_REVERSE_PROXY_SETUP variable set to true, 1) HTTP basic credentials are validated on the HTTPD side in a separate container, not in the Ironic service itself and 2) Ironic listens in host network on a private port 6388 on localhost by default. As a result, when the reverse proxy mode is used, any Pod or local Unix user on the control plane Node can access the Ironic API on the private port without authentication. A similar problem affects Ironic Inspector (INSPECTOR_REVERSE_PROXY_SETUP set to true), although the attack potential is smaller there. This issue affects operators deploying ironic-image in the reverse proxy mode, which is the recommended mode when TLS is used (also recommended), with the IRONIC_PRIVATE_PORT variable unset or set to a numeric value. In this case, an attacker with enough privileges to launch a pod on the control plane with host networking can access Ironic API and use it to modify bare-metal machine, e.g. provision them with a new image or change their BIOS settings. This vulnerability is fixed in 24.1.1.

Affected configurations

Vulners
Node
metal3-ioironic_imageRange<24.1.1

CNA Affected

[
  {
    "vendor": "metal3-io",
    "product": "ironic-image",
    "versions": [
      {
        "version": "< 24.1.1",
        "status": "affected"
      }
    ]
  }
]

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%

Related for CVE-2024-31463