CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
80.7%
A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector’s node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service.
Vendor | Product | Version | CPE |
---|---|---|---|
openstack | ironic-inspector | * | cpe:2.3:a:openstack:ironic-inspector:*:*:*:*:*:*:*:* |
redhat | openstack | 10 | cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* |
redhat | openstack | 13 | cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* |
redhat | openstack | 14 | cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:* |
redhat | enterprise_linux | 7.0 | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* |
redhat | openstack | 9 | cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* |
[
{
"product": "openstack-ironic-inspector",
"vendor": "RedHat",
"versions": [
{
"status": "affected",
"version": "all 5.0.x up to, excluding 5.0.2"
},
{
"status": "affected",
"version": "all 6.0.x up to, excluding 6.0.3"
},
{
"status": "affected",
"version": "all 7.2.x up to, excluding 7.2.4"
},
{
"status": "affected",
"version": "all 8.0.3 up to, excluding 8.0.3"
},
{
"status": "affected",
"version": "8.2.0"
}
]
}
]
access.redhat.com/errata/RHSA-2019:2505
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10141
docs.openstack.org/releasenotes/ironic-inspector/ocata.html#relnotes-5-0-2-7-origin-stable-ocata
docs.openstack.org/releasenotes/ironic-inspector/pike.html#relnotes-6-0-3-4-stable-pike
docs.openstack.org/releasenotes/ironic-inspector/queens.html#relnotes-7-2-4-stable-queens
docs.openstack.org/releasenotes/ironic-inspector/rocky.html#relnotes-8-0-3-stable-rocky
docs.openstack.org/releasenotes/ironic-inspector/stein.html#relnotes-8-2-1-stable-stein
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
80.7%