Impact
During an Ironic import operation, a user can invoke molds and request that an authorization credential be sent to a remote endpoint. The forwarded credential is a time‑limited Keystone token that authorizes access to all OpenStack services for which Ironic is permitted, or basic credentials configured for molds storage. This flaw enables the accidental or malicious disclosure of privileged tokens, allowing an attacker to impersonate the user or gain unauthorized access to critical OpenStack resources.
Affected Systems
The vulnerability affects OpenStack Ironic before version 35.0.1. The patched releases that address the issue are 26.1.6, 29.0.5, 32.0.1, and 35.0.1. Any deployment running an older release is at risk.
Risk and Exploitability
The CVSS score of 7.7 indicates a high severity. Exploitation requires the ability to trigger a molds import, after which a valid Keystone token is automatically forwarded to an arbitrary remote host specified by the requester. The attack surface is therefore limited to environments where Ironic import controls are accessible, but the impact of leaking a privileged token is substantial. With EPSS unavailable and the vulnerability not listed in KEV, the likelihood of exploitation remains uncertain, yet the potential damage warrants prompt remediation.
OpenCVE Enrichment