ESA-06: SOAP Web Services Privilege Escalation Vulnerability

1 view
Skip to first unread message

secu...@eucalyptus.com

unread,
Sep 13, 2012, 2:20:21 PM9/13/12
to security...@eucalyptus.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-06: SOAP Web Services Privilege Escalation Vulnerability

====================================================================
Eucalyptus Security Advisory

Advisory ID: ESA-06
Date: 8-28-2012
Severity: Critical
Affected Versions: Eucalyptus 3.0.2, 3.1.0 and earlier
CVE Number: CVE-2012-4064
====================================================================

OVERVIEW
- ------------

A security vulnerability has been identified in the implementation of
the SOAP interface exposed by front-end components in Eucalyptus 3.1.0
and earlier. An update is now available that resolves this issue. We
advise immediately updating all affected Eucalyptus installations
following the instructions below.

DESCRIPTION
- -------------

Eucalyptus front-end components (Cloud Controller and Walrus) can be
accessed using the SOAP web services messaging protocol. A flaw was
found in an implementation that binds external SOAP messages to
internal representation, that allowed a user with valid Eucalyptus
credentials to submit messages in the internal format via external
services. An external user could use this flaw to escalate privileges
by injecting an effective user id, respected on some code paths, into
internal messages. As a result, a malicious user with valid Eucalyptus
credentials could perform certain operations with privileges of
Eucalyptus admin user and, in some cases, gain root privileges on the
Eucalyptus host.

SOLUTION
- -------------

This issue is resolved in Eucalyptus version 3.1.1.
Please see http://www.eucalyptus.com/download/eucalyptus
for instructions on downloading and upgrading to the latest
Eucalyptus software.

CONTACT and HELP
- -------------

Contact the Eucalyptus Security Team at secu...@eucalyptus.com.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJQUhwzAAoJEAtWzWcVzgD83K8IAJ+puPLF66BPNMRKmBqY82rQ
lFaxAPE/krdZyf0oh0r0/0B6MQwkikySyS/siND/5u2MZaK6Li1GPo6MtBqk5UTy
MUABGal/Kvn1q9THpiXsi4i/kcgEEdr3FY7J99/p2N+5ONxTeN6np6B8N7J8nj1X
Sq+roD2gKrMIkvdCIrhLVydBWNu70oSPV9863PIIQQvxIjRb/DoU4jjLqyz4z8Dl
IR0fHh6aWJGcKUhDMz0EVGqcNT15AA+Zm41F6uz9sol6Z+jrSBPXdKhu8m0Y3e9x
RKLKjC8ka3d3lzwKMacnCu/plb9d5o2Ua5t0Q+gnPq1QYu7skKQoL6kCKLkrejQ=
=ekBt
-----END PGP SIGNATURE-----
Reply all
Reply to author
Forward
0 new messages