// For flags

CVE-2014-0162

openstack-glance: remote code execution in Glance Sheepdog backend

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location.

El backend Sheepdog en OpenStack Image Registry and Delivery Service (Glance) 2013.2 anterior a 2013.2.4 y icehouse anterior a icehouse-rc2 permite a usuarios remotos autenticados con permiso insertar o modificar un imagen para ejecutar comandos arbitrarios a través de una localización manipulada.

OpenStack Image service provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. It was found that Sheepdog, a distributed object storage system, did not properly validate Sheepdog image URIs. A remote attacker able to insert or modify glance image metadata could use this flaw to execute arbitrary commands with the privileges of the user running the glance service. Note that only OpenStack Image setups using the Sheepdog back end were affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-03 CVE Reserved
  • 2014-04-27 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openstack
Search vendor "Openstack"
Icehouse
Search vendor "Openstack" for product "Icehouse"
rc-1
Search vendor "Openstack" for product "Icehouse" and version "rc-1"
-
Affected
Openstack
Search vendor "Openstack"
Image Registry And Delivery Service \(glance\)
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)"
2013.2
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)" and version "2013.2"
-
Affected
Openstack
Search vendor "Openstack"
Image Registry And Delivery Service \(glance\)
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)"
2013.2.1
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)" and version "2013.2.1"
-
Affected
Openstack
Search vendor "Openstack"
Image Registry And Delivery Service \(glance\)
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)"
2013.2.2
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)" and version "2013.2.2"
-
Affected
Openstack
Search vendor "Openstack"
Image Registry And Delivery Service \(glance\)
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)"
2013.2.3
Search vendor "Openstack" for product "Image Registry And Delivery Service \(glance\)" and version "2013.2.3"
-
Affected