CVE-2013-6419

NameCVE-2013-6419
DescriptionInteraction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (agent/metadata/agent.py) in Neutron.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
neutron (PTS)jessie2014.1.3-12fixed
stretch (security), stretch (lts), stretch2:9.1.1-3+deb9u3fixed
buster (security), buster, buster (lts)2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1fixed
bullseye (security), bullseye2:17.2.1-0+deb11u1fixed
bookworm2:21.0.0-7fixed
sid, trixie2:25.0.0-1fixed
nova (PTS)jessie2014.1.3-11fixed
stretch (security), stretch (lts), stretch2:14.0.0-4+deb9u1fixed
buster (security), buster, buster (lts)2:18.1.0-6+deb10u2fixed
bullseye2:22.0.1-2+deb11u1fixed
bullseye (security)2:22.4.0-1~deb11u5fixed
bookworm (security), bookworm2:26.2.2-1~deb12u3fixed
sid, trixie2:30.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
neutronsource(unstable)2013.2.1-1
novasourcewheezy(not affected)
novasource(unstable)2013.2.1-1

Notes

[wheezy] - nova <not-affected> (Only exploitable in combination in neutron, not in Wheezy)
https://launchpad.net/bugs/1235450

Search for package or bug name: Reporting problems