CVE-2017-7200

NameCVE-2017-7200
DescriptionAn SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glance (PTS)jessie2014.1.3-12+deb8u1vulnerable
stretch2:13.0.0-4fixed
buster (security), buster, buster (lts)2:17.0.0-5+deb10u1fixed
bullseye2:21.0.0-2+deb11u1fixed
bullseye (security)2:21.1.0-1+deb11u2fixed
bookworm (security), bookworm2:25.1.0-2+deb12u1fixed
sid, trixie2:29.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glancesourcewheezy(unfixed)end-of-life
glancesource(unstable)2:13.0.0-1

Notes

[jessie] - glance <no-dsa> (Minor issue, too intrusive to backport)
[wheezy] - glance <end-of-life> (Not supported in Wheezy LTS)
https://wiki.openstack.org/wiki/OSSN/OSSN-0078
https://bugs.launchpad.net/ossn/+bug/1606495
https://bugs.launchpad.net/ossn/+bug/1153614
The only implemented solution is to move to the v2 API (deprecated in
2:13.0.0-1, using that as the fixed version)

Search for package or bug name: Reporting problems