CVE-2024-28716

7.5 HIGH

📋 TL;DR

CVE-2024-28716 is a remote code execution vulnerability in OpenStack Storlets yoga-eom's gateway.py component. It allows attackers to execute arbitrary code on affected systems. This affects OpenStack deployments using Storlets with vulnerable versions.

💻 Affected Systems

Products:
  • OpenStack Storlets
Versions: yoga-eom version (specific vulnerable version range not specified in provided references)
Operating Systems: Linux-based systems running OpenStack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects OpenStack deployments using Storlets functionality. The gateway.py component is vulnerable when accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, access sensitive data, and pivot to other systems in the OpenStack environment.

🟠

Likely Case

Unauthorized code execution leading to data theft, service disruption, or deployment of malware within the OpenStack infrastructure.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if the vulnerable component is exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires access to the vulnerable service.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

References indicate proof-of-concept details are available. The vulnerability appears to be remotely exploitable without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check OpenStack security advisories for specific patched version

Vendor Advisory: https://bugs.launchpad.net/solum/+bug/2047505

Restart Required: Yes

Instructions:

1. Check OpenStack security advisories for patch details. 2. Update OpenStack Storlets to patched version. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to Storlets gateway.py component

iptables -A INPUT -p tcp --dport [STORLETS_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [STORLETS_PORT] -j DROP

Service Disablement

linux

Temporarily disable Storlets service if not essential

systemctl stop openstack-storlets-gateway
systemctl disable openstack-storlets-gateway

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of Storlets service
  • Deploy application-level firewalls or WAF rules to monitor and block suspicious requests to gateway.py

🔍 How to Verify

Check if Vulnerable:

Check if OpenStack Storlets yoga-eom version is running and gateway.py component is accessible

Check Version:

openstack --version | grep storlets OR check package manager: rpm -qa | grep storlets OR dpkg -l | grep storlets

Verify Fix Applied:

Verify OpenStack Storlets has been updated to patched version and test for vulnerability using security scanning tools

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to gateway.py endpoint
  • Suspicious command execution patterns in system logs
  • Unexpected process creation from Storlets service

Network Indicators:

  • Anomalous traffic to Storlets service port
  • Unexpected outbound connections from Storlets host

SIEM Query:

source="storlets.log" AND ("gateway.py" OR "exec" OR "system")

🔗 References

📤 Share & Export