use_forwarded_for exposes metadata
Bug #1563954 reported by
Rob Crittenden
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Compute (nova) |
Confirmed
|
High
|
Unassigned | ||
OpenStack Security Advisory |
Opinion
|
Undecided
|
Unassigned | ||
OpenStack Security Notes |
Fix Released
|
High
|
Robert Clark |
Bug Description
The nova metadata service uses the remote address to determine which metadata to retrieve. In order to work behind a proxy there is an option use_forwarded_for which will use the X-Forwarded-For header to determine the remote IP.
If this option is set then anyone who can access the metadata port can request metadata for any instance if they know the IP.
The user data is also exposed.
$ echo 123456 > /tmp/data
$ openstack server create --image CentOS7 --flavor fedora --user-data /tmp/data test
<wait>
$ curl -H 'X-Forwarded-For: 10.0.0.7' http://
123456
At a minimum this side-effect isn't documented anywhere I could find.
Changed in nova: | |
assignee: | nobody → Tony Breeds (o-tony) |
importance: | Undecided → High |
status: | New → Confirmed |
Changed in ossn: | |
assignee: | nobody → Travis McPeak (travis-mcpeak) |
Changed in ossn: | |
assignee: | Travis McPeak (travis-mcpeak) → nobody |
assignee: | nobody → Robert Clark (robert-clark) |
Changed in ossn: | |
status: | New → Confirmed |
importance: | Undecided → High |
Changed in ossn: | |
status: | Confirmed → In Progress |
information type: | Public Security → Public |
tags: | added: security |
description: | updated |
Changed in nova: | |
assignee: | Tony Breeds (o-tony) → nobody |
To post a comment you must log in.
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.