Thursday, 2024-10-03

zigoIt's unclear to me: is there a fix for CVE-2024-7319 ?08:31
tkajinamzigo, no, but the abandon command is disabled by default. it's specific to the cloud enabling it and for abandon we do need to expose secrets so that users can get full templates10:16
tkajinamhttps://nvd.nist.gov/vuln/detail/CVE-2024-731910:16
zigotkajinam: Right, but the functionally is important, and *we* enable it.10:17
tkajinamI don't know why it was reported to Red Hat product. I've seen a few people submit product CVE to get it "fixed" in upstream which is quite wired.10:17
tkajinamthen if we "fix" it then it breaks the feature10:17
tkajinamwe can't fix it without breaking it10:18
tkajinamnormal users can view secrets. only admin may view it but admin user in most case has access to db so sneaking the secret in API doesn't make the situation very bad10:19
tkajinamnormal users can view "only their own" secrets, I mean10:19
tkajinamand admin may view secrets for all users10:20
tkajinamas they can abandon stacks in any projects10:20
zigoOk, I see. So it's not really a big problem right now either, is that what you're saying?10:20
tkajinamyes10:22
tkajinamit's usual "secret in API response" type of vulnerability .10:22
pas-ha[m]my 5c - this is a fluke due to not proper understanding of resource ownership model in OpenStack in general. In openstack MOST of the things are owned by the project (rare exceptions are e.g. app creds in keystone and keypairs in nova which are owned by the user), and that includes Heat stacks. The 'hidden parameters' feature is there to guard from unintended secret exposure, e.g. by read-only users (reader). Still, by the virtue of stack19:47
pas-ha[m]being owned by the project, according to default policies, any user with a sufficient role in the project (e.g. member) must be able to manipulate an existing stack in this project - update it, delete it, abandon it or adopt it. Exporting all the details of the stack (including the 'hidden' parameters) during abandon is essential to be able to re-create (adopt) this stack later. Heat has no mechanism of ascribing 'ownership' of the stack19:47
pas-ha[m]specifically to the user who created it. The most you could do is to limit the policy for abandon/adopt APIs to e.g. to (project) admins only.19:47
pas-ha[m]tkajinam: zigo ^19:49
pas-ha[m]btw I once proposed a patch to nova to add some user-based access granularity (specifically to be able to limit getting vnc console url only to the user who created VM) and that was denied on the same grounds - the owning entity for instance is the project. If you want exclusive access to the user - get yourself a project where only you have roles in.19:53

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!