{"api_version":"1","generated_at":"2026-04-23T10:40:16+00:00","cve":"CVE-2017-12155","urls":{"html":"https://cve.report/CVE-2017-12155","api":"https://cve.report/api/cve/CVE-2017-12155.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-12155","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-12155"},"summary":{"title":"CVE-2017-12155","description":"A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2017-12-12 20:29:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489360","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1489360","refsource":"CONFIRM","tags":["Issue Tracking","Mitigation"],"title":"1489360 – (CVE-2017-12155) CVE-2017-12155 openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2018:1593","name":"RHSA-2018:1593","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.launchpad.net/tripleo/+bug/1720787","name":"https://bugs.launchpad.net/tripleo/+bug/1720787","refsource":"CONFIRM","tags":["Issue Tracking","Patch"],"title":"Bug #1720787 “TripleO deploys ceph client keyring with 644 permi...” : Bugs : tripleo","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2018:1627","name":"RHSA-2018:1627","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2018:0602","name":"RHSA-2018:0602","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-12155","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12155","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"12155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ceph","cpe5":"ceph","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"openstack","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"12155","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ceph","cpe5":"ceph","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"openstack","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","DATE_PUBLIC":"2017-09-20T00:00:00","ID":"CVE-2017-12155","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"openstack-tripleo-heat-templates","version":{"version_data":[{"version_value":"Newton, Ocata, Pike and possibly older"}]}}]},"vendor_name":"OpenStack"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Incorrect Permission Assignment for Critical Resource"}]}]},"references":{"reference_data":[{"name":"RHSA-2018:1593","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:1593"},{"name":"RHSA-2018:1627","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:1627"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1489360","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489360"},{"name":"https://bugs.launchpad.net/tripleo/+bug/1720787","refsource":"CONFIRM","url":"https://bugs.launchpad.net/tripleo/+bug/1720787"},{"name":"RHSA-2018:0602","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:0602"}]}},"nvd":{"publishedDate":"2017-12-12 20:29:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.3},"severity":"LOW","exploitabilityScore":3.4,"impactScore":4.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ceph:ceph:-:*:*:*:*:openstack:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"12155","Ordinal":"109302","Title":"CVE-2017-12155","CVE":"CVE-2017-12155","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"12155","Ordinal":"1","NoteData":"A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"12155","Ordinal":"2","NoteData":"2017-12-12","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"12155","Ordinal":"3","NoteData":"2018-05-19","Type":"Other","Title":"Modified"}]}}}