Description
A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
Published: 2018-08-22
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-11788 A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
History

No history.

Subscriptions

Openstack Tripleo-common
Redhat Openstack
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T14:02:06.902Z

Reserved: 2016-12-01T00:00:00.000Z

Link: CVE-2017-2627

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-22T17:29:00.257

Modified: 2024-11-21T03:23:51.777

Link: CVE-2017-2627

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-02-14T00:00:00Z

Links: CVE-2017-2627 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses