Vulnerability Details : CVE-2015-3156
The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file.
Products affected by CVE-2015-3156
- cpe:2.3:a:openstack:trove:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3156
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3156
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2015-3156
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3156
-
https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backup/mysql_impl.py#L110
trove/mysql_impl.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experimental/redis/service.py#L236
trove/service.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experimental/cassandra/service.py#L230
trove/service.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/restore/mysql_impl.py#L194
trove/mysql_impl.py at master · openstack/trove · GitHubThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1216073
1216073 – (CVE-2015-3156) CVE-2015-3156 openstack-trove: multiple insecure /tmp file usage issuesIssue Tracking;Third Party Advisory;VDB Entry
-
https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backup/experimental/couchbase_impl.py#L30
trove/couchbase_impl.py at master · openstack/trove · GitHubThird Party Advisory
-
https://bugs.launchpad.net/trove/+bug/1398195
Bug #1398195 “Insecure temporary file usage in Cassandra datasto...” : Bugs : OpenStack DBaaS (Trove)Issue Tracking;Third Party Advisory;VDB Entry
-
https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backup/mysql_impl.py#L36
trove/mysql_impl.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/mysql/service.py#L790
trove/service.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experimental/mongodb/service.py#L176
trove/service.py at master · openstack/trove · GitHubThird Party Advisory
-
https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backup/mysql_impl.py#L55
trove/mysql_impl.py at master · openstack/trove · GitHubThird Party Advisory
Jump to