CVE-2021-31918
📋 TL;DR
This vulnerability exposes Ansible log files to all users during OpenStack stack operations, potentially revealing sensitive configuration data and credentials. It affects Red Hat OpenStack Platform 16.1 deployments using tripleo-ansible. The primary risk is unauthorized information disclosure.
💻 Affected Systems
- Red Hat OpenStack Platform
📦 What is this software?
Openstack by Redhat
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to sensitive credentials, API keys, or configuration secrets stored in Ansible logs, leading to complete system compromise or data exfiltration.
Likely Case
Unauthorized users read sensitive operational data, configuration details, or partial credentials from log files, potentially enabling further attacks.
If Mitigated
Log files remain inaccessible to unauthorized users, limiting exposure to only authorized administrators with proper access controls.
🎯 Exploit Status
Exploitation requires local user access to read log files during specific OpenStack operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: tripleo-ansible-10.5.2-1.20210422163547.el8ost
Vendor Advisory: https://access.redhat.com/errata/RHSA-2021:2427
Restart Required: No
Instructions:
1. Update tripleo-ansible package to version 10.5.2-1.20210422163547.el8ost or later. 2. Apply via yum update: 'yum update tripleo-ansible'. 3. No service restart required.
🔧 Temporary Workarounds
Manual log file permission adjustment
linuxTemporarily set restrictive permissions on Ansible log files during stack operations
chmod 600 /var/log/ansible/*.log
chown root:root /var/log/ansible/*.log
🧯 If You Can't Patch
- Implement strict access controls to limit user access to log directories
- Monitor and audit access to Ansible log files for unauthorized reading attempts
🔍 How to Verify
Check if Vulnerable:
Check tripleo-ansible package version: 'rpm -q tripleo-ansible'. If version is earlier than 10.5.2-1.20210422163547.el8ost, system is vulnerable.
Check Version:
rpm -q tripleo-ansible
Verify Fix Applied:
Verify package update: 'rpm -q tripleo-ansible' should show version 10.5.2-1.20210422163547.el8ost or later. Check log file permissions: 'ls -la /var/log/ansible/' should show restricted access.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /var/log/ansible/ directory
- Multiple failed permission checks on log files
Network Indicators:
- N/A - local file access vulnerability
SIEM Query:
source="/var/log/secure" AND ("Permission denied" AND "/var/log/ansible") OR ("access" AND "/var/log/ansible" AND "failed")