Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. tripleo-common
  4. ›
  5. CVE-2019-3895

CVE-2019-3895: Improper Access Control

June 3, 2019 (updated July 2, 2019)

An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.

References

  • bugs.launchpad.net/octavia/+bug/1620629
  • bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3895
  • github.com/openstack/tripleo-common/commit/e7c5eab712e0f70ecbc6d225d4766e0fe0f3f884
  • nvd.nist.gov/vuln/detail/CVE-2019-3895

Code Behaviors & Features

Detect and mitigate CVE-2019-3895 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.0.0

Fixed versions

  • 11.0.0

Solution

Upgrade to fixed version

Impact 6.8 MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P

Learn more about CVSS

Source file

pypi/tripleo-common/CVE-2019-3895.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.