Vulnerability Name: | CVE-2016-4972 (CCN-114396) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2016-06-23 | ||||||||||||||||||||||||||||||||||||
Published: | 2016-06-23 | ||||||||||||||||||||||||||||||||||||
Updated: | 2016-09-28 | ||||||||||||||||||||||||||||||||||||
Summary: | OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-4972 Source: CCN Type: oss-sec Mailing List, Thu, 23 Jun 2016 20:42:13 +0300 RCE vulnerability in Openstack Murano using insecure YAML tags (CVE-2016-4972) Source: MLIST Type: Patch, Third Party Advisory [oss-security] 20160623 RCE vulnerability in Openstack Murano using insecure YAML tags (CVE-2016-4972) Source: CONFIRM Type: Patch, Vendor Advisory https://bugs.launchpad.net/murano/+bug/1586079 Source: CONFIRM Type: Patch, Vendor Advisory https://bugs.launchpad.net/python-muranoclient/+bug/1586078 Source: XF Type: UNKNOWN openstack-murano-cve20164972-code-exec(114396) Source: CCN Type: Openstack Web site Murano Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-4972 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |