Impact
This vulnerability is a Server‑Side Request Forgery that permits an authenticated user to trigger HTTP redirects during image import. By bypassing normal URL validation, Glance can reach internal network services, potentially exposing private resources or enabling internal reconnaissance. The flaw aligns with CWE‑918, and no evidence suggests it leads to remote code execution or denial of service.
Affected Systems
Affected installations are OpenStack Glance versions earlier than 29.1.1, any 30.x release prior to 30.1.1, and the 31.0.0 release. Only the image import pathways—web‑download, glance‑download, and the optional ovf_process plugin—are susceptible. Users must have authentication and the privilege to initiate image import for exploitation.
Risk and Exploitability
The CVSS score is 5, indicating moderate severity, EPSS is below 1 %, showing a low likelihood of exploitation, and it is not listed in the CISA KEV catalog. Based on the description, the attack requires an authenticated user to supply a crafted URL that redirects to an internal endpoint; therefore the likely attack vector is credentialed internal administration. If an attacker directs Glance to an internal service, they may obtain sensitive data or pivot further inside the network.
OpenCVE Enrichment
Github GHSA