CVE-2021-4472
📋 TL;DR
The mistral-dashboard plugin for OpenStack contains a local file inclusion vulnerability in the 'Create Workbook' feature. This allows authenticated users to read arbitrary files from the local filesystem, potentially exposing sensitive configuration files, credentials, or other confidential data. This affects OpenStack deployments using the vulnerable mistral-dashboard plugin.
💻 Affected Systems
- OpenStack mistral-dashboard plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker could read sensitive system files including configuration files, SSH keys, database credentials, or other secrets, leading to complete system compromise or data exfiltration.
Likely Case
Authenticated users with dashboard access could read sensitive OpenStack configuration files, potentially gaining access to credentials or system information that could be used for further attacks.
If Mitigated
With proper access controls and network segmentation, the impact is limited to reading files accessible to the mistral-dashboard process, though sensitive configuration data could still be exposed.
🎯 Exploit Status
Exploitation requires authenticated access to the OpenStack dashboard. The vulnerability is in the file upload/processing logic of the Create Workbook feature.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in mistral-dashboard commit 800952 and python-mistralclient commit 800950
Vendor Advisory: https://access.redhat.com/security/cve/CVE-2021-4472
Restart Required: Yes
Instructions:
1. Update mistral-dashboard to patched version. 2. Update python-mistralclient to patched version. 3. Restart Horizon dashboard service. 4. Verify the fix by testing the Create Workbook feature.
🔧 Temporary Workarounds
Disable mistral-dashboard plugin
linuxTemporarily disable the vulnerable mistral-dashboard plugin from Horizon dashboard
Edit Horizon configuration to remove or disable mistral-dashboard plugin
Restart Horizon service
Restrict dashboard access
allLimit access to OpenStack dashboard to trusted users only
Configure firewall rules to restrict dashboard access
Implement strict authentication controls
🧯 If You Can't Patch
- Disable the mistral-dashboard plugin entirely from Horizon configuration
- Implement strict network segmentation to isolate the OpenStack dashboard from sensitive systems
🔍 How to Verify
Check if Vulnerable:
Check if mistral-dashboard plugin is installed and enabled in Horizon configuration, and verify version against patched commits
Check Version:
pip show mistral-dashboard python-mistralclient
Verify Fix Applied:
Test the Create Workbook feature with attempts to include local files; successful patch should reject such attempts
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in mistral-dashboard logs
- Multiple failed workbook creation attempts
- Access to unusual file paths in dashboard logs
Network Indicators:
- Unusual traffic patterns to dashboard workbook creation endpoints
- Multiple rapid requests to Create Workbook feature
SIEM Query:
source="horizon.log" AND "Create Workbook" AND ("file://" OR "../" OR path traversal patterns)
🔗 References
- https://access.redhat.com/security/cve/CVE-2021-4472
- https://bugs.launchpad.net/horizon/+bug/1931558
- https://bugzilla.redhat.com/show_bug.cgi?id=2417321
- https://review.opendev.org/c/openstack/mistral-dashboard/+/800952
- https://review.opendev.org/c/openstack/python-mistralclient/+/800950
- https://lists.debian.org/debian-lts-announce/2025/12/msg00002.html
- https://lists.debian.org/debian-lts-announce/2025/12/msg00003.html