Name | CVE-2017-7200 |
Description | An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
glance (PTS) | jessie | 2014.1.3-12+deb8u1 | vulnerable |
| stretch | 2:13.0.0-4 | fixed |
| buster (security), buster, buster (lts) | 2:17.0.0-5+deb10u1 | fixed |
| bullseye | 2:21.0.0-2+deb11u1 | fixed |
| bullseye (security) | 2:21.1.0-1+deb11u2 | fixed |
| bookworm (security), bookworm | 2:25.1.0-2+deb12u1 | fixed |
| sid, trixie | 2:29.0.0-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
glance | source | wheezy | (unfixed) | end-of-life | | |
glance | source | (unstable) | 2:13.0.0-1 | | | |
Notes
[jessie] - glance <no-dsa> (Minor issue, too intrusive to backport)
[wheezy] - glance <end-of-life> (Not supported in Wheezy LTS)
https://wiki.openstack.org/wiki/OSSN/OSSN-0078
https://bugs.launchpad.net/ossn/+bug/1606495
https://bugs.launchpad.net/ossn/+bug/1153614
The only implemented solution is to move to the v2 API (deprecated in
2:13.0.0-1, using that as the fixed version)