CVE-2016-9599
puppet-tripleo: if ssl is enabled, traffic is open on both undercloud and overcloud
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.
puppet-tripleo, en versiones anteriores a la 5.5.0 y la 6.2.0, es vulnerable a un error de control de acceso en la gestión de reglas IPtables, que permite la creación de reglas TCP/UDP con valores de puerto vacíos. Si SSL está habilitado, un usuario malicioso podría emplear estos puertos abiertos para obtener acceso a recursos no autorizados.
puppet-tripleo is a key component of the Red Hat OpenStack Platform director, which is a toolset for installing and managing a complete OpenStack environment. Security Fix: An access-control flaw was discovered in puppet-tripleo's IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. Some API services in Red Hat OpenStack Platform director are not exposed to public networks, which meant their $public_ssl_port value was set to empty. If SSL was enabled, a malicious user could use these open ports to gain access to unauthorized resources.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-11-23 CVE Reserved
- 2017-01-06 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9599 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0025.html | 2021-08-04 | |
https://access.redhat.com/security/cve/CVE-2016-9599 | 2017-01-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1409687 | 2017-01-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Puppet-tripleo Search vendor "Openstack" for product "Puppet-tripleo" | 5.5.0 Search vendor "Openstack" for product "Puppet-tripleo" and version "5.5.0" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Puppet-tripleo Search vendor "Openstack" for product "Puppet-tripleo" | 6.2.0 Search vendor "Openstack" for product "Puppet-tripleo" and version "6.2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openstack Search vendor "Redhat" for product "Openstack" | 10 Search vendor "Redhat" for product "Openstack" and version "10" | - |
Affected
|