{
  "threat_severity" : "Moderate",
  "public_date" : "2020-06-03T00:00:00Z",
  "bugzilla" : {
    "description" : "openstack-cinder: Improper handling of ScaleIO backend credentials",
    "id" : "1842748",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1842748"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-522",
  "details" : [ "An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project", "An insecure-credentials flaw was found in openstack-cinder. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint.  Source: OpenStack project" ],
  "statement" : "In addition to the software updates for this flaw, you must deploy a new configuration file on compute nodes, cinder nodes, and anywhere you would perform a volume attachment in your deployment.  For detailed information, refer to referenced article.",
  "acknowledgement" : "This issue was discovered by David Hill (Red Hat) and Eric Harney (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenStack Platform 13.0 (Queens)",
    "release_date" : "2020-10-28T00:00:00Z",
    "advisory" : "RHSA-2020:4391",
    "cpe" : "cpe:/a:redhat:openstack:13::el7",
    "package" : "openstack-cinder-1:12.0.10-19.el7ost"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS",
    "release_date" : "2020-10-28T00:00:00Z",
    "advisory" : "RHSA-2020:4391",
    "cpe" : "cpe:/a:redhat:openstack:13::el7",
    "package" : "openstack-cinder-1:12.0.10-19.el7ost"
  }, {
    "product_name" : "Red Hat OpenStack Platform 16.1",
    "release_date" : "2020-10-28T00:00:00Z",
    "advisory" : "RHSA-2020:4283",
    "cpe" : "cpe:/a:redhat:openstack:16.1::el8",
    "package" : "openstack-cinder-1:15.3.1-1.20200914173114.00ac80b.el8ost"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenStack Platform 10 (Newton)",
    "fix_state" : "Out of support scope",
    "package_name" : "openstack-cinder",
    "cpe" : "cpe:/a:redhat:openstack:10"
  }, {
    "product_name" : "Red Hat OpenStack Platform 15 (Stein)",
    "fix_state" : "Out of support scope",
    "package_name" : "openstack-cinder",
    "cpe" : "cpe:/a:redhat:openstack:15"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-10755\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-10755\nhttps://wiki.openstack.org/wiki/OSSN/OSSN-0086" ],
  "name" : "CVE-2020-10755",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}