Vulnerability Description
The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Trove | <= 2014.2.4 |
Related Weaknesses (CWE)
References
- https://bugs.launchpad.net/trove/+bug/1398195Issue TrackingThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1216073Issue TrackingThird Party AdvisoryVDB Entry
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experiThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experiThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experiThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/mysql/Third Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backuThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backuThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backuThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/backuThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/strategies/restoThird Party Advisory
- https://bugs.launchpad.net/trove/+bug/1398195Issue TrackingThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1216073Issue TrackingThird Party AdvisoryVDB Entry
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experiThird Party Advisory
- https://github.com/openstack/trove/blob/master/trove/guestagent/datastore/experiThird Party Advisory
FAQ
What is CVE-2015-3156?
CVE-2015-3156 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_co...
How severe is CVE-2015-3156?
CVE-2015-3156 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3156?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Trove.