|
Message-ID: <20240314202702.nl2rwe5oubaymb3y@yuggoth.org>
Date: Thu, 14 Mar 2024 20:27:02 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: OSSN-0093: [OpenStack Murano] Unsafe Environment Handling in MuranoPL
OSSN-0093
Unsafe Environment Handling in MuranoPL
### Summary ###
The Murano service's MuranoPL extension to the YAQL language fails
to sanitize the supplied environment, leading to potential leakage
of sensitive service account information. Murano is an inactive
project[*], so no fix is currently under development for this
vulnerability. It is strongly recommended that any OpenStack
deployments disable or fully remove Murano, if installed, at the
earliest opportunity.
[*] https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects
### Affected Services / Software ###
- murano: all versions
### Discussion ###
The YAQL interpreter project has released a new major version
(3.0.0) which removes support for format strings, a feature
necessary to exploit this condition in MuranoPL. Because Murano is
not considered under active maintenance in OpenStack, its complete
removal from all deployments is still strongly advised.
Note that this behavior change in YAQL means configurations relying
on string formatting will no longer be interpreted the same after
upgrading, which could cause them to not work as intended by their
users in services which accept YAQL (including Heat and Mistral).
Reliance on that feature is considered to be unusual, but users
should be made aware in case it negatively impacts their
configuration.
### Recommended Actions ###
Disable the Murano service in, or fully remove it from, all
OpenStack deployments at the earliest opportunity.
### Credits ###
kirualawliet and edwardpeng from Sangfor Security Research Team
### Contacts / References ###
Authors:
- Jeremy Stanley, OpenStack Vulnerability Coordinator
This OSSN: https://wiki.openstack.org/wiki/OSSN/OSSN-0093
Original bug: https://launchpad.net/bugs/2048114
Mailing List : [security-sig] openstack-discuss@...ts.openstack.org
--
Jeremy Stanley, OpenStack Vulnerability Coordinator
Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.