CVE-2015-5251: OpenStack Image Service (Glance) allows remote authenticated users to bypass access restrictions
5.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39214%
CWE
-
Published
5/17/2022
Updated
2/13/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
AV:N/AC:L/Au:S/C:N/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
glance | pip | < 2014.2.4 | 2014.2.4 |
glance | pip | >= 2015.1.0, < 2015.1.2 | 2015.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper validation of the x-image-meta-status header in v1 API requests. The patch adds validation
logic to the ImagesController.update()
method in glance/api/v1/images.py
, specifically checking if the provided status matches the current image status. This indicates that prior to the patch, the update method processed these headers without proper authorization checks, making it the entry point for the vulnerability. The function signature matches the API endpoint structure and would appear in profilers handling image update operations.