-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stemmed from missing tenant ID validation when handling router interface ports. The patches modify create_port() and update_port() in NeutronDbPluginV2 to add _enforce_device_owner_not_router_intf_or_device_id checks. These core API methods were the entry points for port operations and contained the vulnerable code path before the security checks were added. Runtime exploitation would directly involve these functions as they process port-create/update requests.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| neutron | pip | >= 2012.2, < 2013.2.3 | 2013.2.3 |