Miggo Logo

CVE-2017-7549:
instack-undercloud vulnerable to symlink attack on tmp files

6.4

CVSS Score
3.0

Basic Information

EPSS Score
0.23013%
Published
5/13/2022
Updated
4/22/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
instack-undercloudpip<= 7.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly identifies two scripts using hardcoded /tmp paths: 86-selinux (using /tmp/ipxe.mod) and 00-disable-external-installs (using /tmp/yum-blacklist). Both create temporary files in insecure manner (CWE-377) without proper atomic file creation or randomness, making them vulnerable to symlink race attacks (CWE-59). The Red Hat bug report and CVE description directly reference these script paths as vulnerable components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in inst**k-un**r*lou* *.*.* *s p**k**** in R** **t Op*nSt**k Pl*t*orm Pik*, *.*.* *s p**k**** in R** **t Op*nSt**k Pl*t*orm O**t*, *.*.* *s p**k**** in R** **t Op*nSt**k N*wton, w**r* pr*-inst*ll *n* s**urity poli*y s*ripts us** ins*

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly i**nti*i*s two s*ripts usin* **r**o*** `/tmp` p*t*s: `**-s*linux` (usin* `/tmp/ipx*.mo*`) *n* `**-*is**l*-*xt*rn*l-inst*lls` (usin* `/tmp/yum-*l**klist`). *ot* *r**t* t*mpor*ry *il*s in ins**ur* m*nn*r (*W*-