Neutron should not create security group with project==None
Bug #1988026 reported by
Dr. Jens Harbott
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Security Advisory |
New
|
Undecided
|
Unassigned | ||
neutron |
Fix Released
|
Critical
|
Brian Haley |
Bug Description
When a non-admin user tries to list security groups for project_id "None", Neutron creates a default security group for that project and returns an empty list to the caller.
To reproduce:
openstack --os-cloud devstack security group list --project None
openstack --os-cloud devstack-admin security group list
The API call that is made is essentially
GET /networking/
The expected result would be an authorization failure, since normal users should not be allowed to list security groups for other projects.
CVE References
description: | updated |
Changed in neutron: | |
importance: | Undecided → Low |
tags: | added: api low-hanging-fruit |
information type: | Public → Public Security |
Changed in neutron: | |
assignee: | nobody → Brian Haley (brian-haley) |
To post a comment you must log in.
Opensearch link: /opensearch. logs.openstack. org/_dashboards /app/discover/ ?security_ tenant= global# /?_g=(filters: !(),refreshInte rval:(pause: !t,value: 0),time: (from:now- 14d,to: now))&_ a=(columns: !(build_ name,build_ status) ,filters: !(),index: '94869730- aea8-11ec- 9e6a-83741af3fd cd',interval: auto,query: (language: kuery,query: 'message: %22Cannot% 20find% 20Port_ Group%20with% 20name% 3D%22') ,sort:! ())
https:/