Bug 897103 (CVE-2014-7144) - VUL-0: CVE-2014-7144: python-keystoneclient: TLS cert verification option not honoured in paste configs
Summary: VUL-0: CVE-2014-7144: python-keystoneclient: TLS cert verification option not...
Status: RESOLVED FIXED
Alias: CVE-2014-7144
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-02-16
Assignee: Bernhard Wiedemann
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp3-cl4:60275 ma...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-17 12:01 UTC by Marcus Meissner
Modified: 2018-02-16 15:35 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-09-17 12:01:40 UTC
via oss-sec and openstack advisory
A vulnerability was discovered in OpenStack (see below). In order to
ensure full traceability, we need a CVE number assigned that we can
attach to further notifications. This issue is already public, although an
advisory was not sent yet.

Title: TLS cert verification option not honoured in paste configs
Reporter: Qin Zhao (IBM)
Products: keystonemiddleware, python-keystoneclient
Versions: versions up to 1.1.1 (keystonemiddleware), versions up to 0.10.1
(python-keystoneclient)

Description:
Qin Zhao from IBM reported a vulnerability in keystonemiddleware (formerly
shipped as python-keystoneclient). When the 'insecure' SSL option is set in 
a paste configuration file it is effectively ignored, regardless of its 
value.  As a result certificate verification will be disabled, leaving TLS
connections open to MITM attacks. All versions of keystonemiddleware with
TLS settings configured via a paste.ini file are affected by this flaw.

References:
http://launchpad.net/bugs/1353315
Comment 1 Swamp Workflow Management 2014-09-17 22:00:43 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2014-09-22 06:26:49 UTC
CVE-2014-7144
Comment 3 SMASH SMASH 2014-09-25 08:40:13 UTC
Affected packages:

SLE-11-SP3-CL4: python-keystoneclient
SLE-11-SP3-PRODUCTS: python-keystoneclient
SLE-11-SP3-UPTU: python-keystoneclient
SLE-12: python-keystoneclient
Comment 4 Dirk Mueller 2014-10-07 19:56:10 UTC
This breaks OpenStack completely:

2014-10-07 21:52:14.683 11862 TRACE neutron   File "/usr/lib64/python2.6/site-packages/keystoneclient/middleware/auth_token.py", line 1314, in auth_filter
2014-10-07 21:52:14.683 11862 TRACE neutron     return AuthProtocol(app, conf)
2014-10-07 21:52:14.683 11862 TRACE neutron   File "/usr/lib64/python2.6/site-packages/keystoneclient/middleware/auth_token.py", line 401, in __init__
2014-10-07 21:52:14.683 11862 TRACE neutron     self.conf = _conf_values_type_convert(conf)
2014-10-07 21:52:14.683 11862 TRACE neutron   File "/usr/lib64/python2.6/site-packages/keystoneclient/middleware/auth_token.py", line 347, in _conf_values_type_convert
2014-10-07 21:52:14.683 11862 TRACE neutron     opt_types = dict((o.dest, o.type) for o in opts)
2014-10-07 21:52:14.683 11862 TRACE neutron   File "/usr/lib64/python2.6/site-packages/keystoneclient/middleware/auth_token.py", line 347, in <genexpr>
2014-10-07 21:52:14.683 11862 TRACE neutron     opt_types = dict((o.dest, o.type) for o in opts)
2014-10-07 21:52:14.683 11862 TRACE neutron AttributeError: 'StrOpt' object has no attribute 'type'
Comment 5 Bernhard Wiedemann 2014-10-14 08:40:22 UTC
with Ionut, we found that the breakage comes from old oslo.config-1.2
which does not provide the type attribute.
oslo.config-1.4. from Juno worked
but I wonder if it is worth updating it
Comment 7 Swamp Workflow Management 2015-01-19 13:45:01 UTC
An update workflow for this issue was started.
This issue was rated as low.
Please submit fixed packages until 2015-02-16.
https://swamp.suse.de/webswamp/wf/60274
Comment 8 Swamp Workflow Management 2015-02-05 00:08:41 UTC
SUSE-SU-2015:0221-1: An update that solves one vulnerability and has one errata is now available.

Category: security (low)
Bug References: 897103,913692
CVE References: CVE-2014-7144
Sources used:
SUSE Cloud 4 (src):    python-keystoneclient-0.9.0-0.11.1
Comment 9 Alexander Bergmann 2015-05-12 10:55:34 UTC
This needs to be fixed in Cloud5 as well. Please resubmit python-keystoneclient based on sr#57312.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7144

"OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate."
Comment 10 Thomas Bechtold 2015-06-03 08:28:50 UTC
@Alexander: This is already fixed in python-keystoneclient-1.0.0 which is the version in Cloud 5.
Comment 11 Marcus Meissner 2015-06-08 08:24:00 UTC
then we can close I think
Comment 12 Swamp Workflow Management 2015-06-25 13:05:10 UTC
SUSE-SU-2015:1141-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 897103,928205
CVE References: CVE-2014-7144,CVE-2015-1852
Sources used:
SUSE Cloud 4 (src):    python-keystoneclient-0.9.0-0.13.1