Cause conflicts within glance public metadefs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Glance |
Triaged
|
High
|
Unassigned | ||
OpenStack Security Advisory |
Won't Fix
|
Undecided
|
Tristan Cacqueray |
Bug Description
Overview:
Through creation of a new public namespace by any user of the system, you can create a clash of namespaces, that breaks all accessibility to that namespace. This therefore can be used to cause a denial of service attack or you have to disable the service completely.
How to produce:
As a regular user run the command:
curl -v -X POST http://
This will create a new namespace with the same name as the existing namespace. This has now rendered the original namespace inaccessible. If a GET request is done to the namespaces name by any other user via (or viewing in horizon):
curl -v -X GET http://
It will cause the following output in the api console:
2015-07-28 23:41:42.175 ERROR glance.
Returning a 500 to the user and therefore the namespace inaccessible meaning a successful denial of service to most of the metadefs api as most require it.
Attempted preventative measures:
In the policy.json files there are only the following values:
"get_metadef_
"get_metadef_
"modify_
"add_metadef_
meaning that creating namespaces has to be disabled completely(not default ) as there in no publicize option.
Changed in ossa: | |
status: | Incomplete → Confirmed |
information type: | Private Security → Public Security |
description: | updated |
Changed in glance: | |
assignee: | nobody → Khuong Luu (organic-doge) |
assignee: | Khuong Luu (organic-doge) → nobody |
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.