CVE-2024-28716
📋 TL;DR
CVE-2024-28716 is a remote code execution vulnerability in OpenStack Storlets yoga-eom's gateway.py component. It allows attackers to execute arbitrary code on affected systems. This affects OpenStack deployments using Storlets with vulnerable versions.
💻 Affected Systems
- OpenStack Storlets
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary commands, access sensitive data, and pivot to other systems in the OpenStack environment.
Likely Case
Unauthorized code execution leading to data theft, service disruption, or deployment of malware within the OpenStack infrastructure.
If Mitigated
Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.
🎯 Exploit Status
References indicate proof-of-concept details are available. The vulnerability appears to be remotely exploitable without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check OpenStack security advisories for specific patched version
Vendor Advisory: https://bugs.launchpad.net/solum/+bug/2047505
Restart Required: Yes
Instructions:
1. Check OpenStack security advisories for patch details. 2. Update OpenStack Storlets to patched version. 3. Restart affected services. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Network Isolation
linuxRestrict network access to Storlets gateway.py component
iptables -A INPUT -p tcp --dport [STORLETS_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [STORLETS_PORT] -j DROP
Service Disablement
linuxTemporarily disable Storlets service if not essential
systemctl stop openstack-storlets-gateway
systemctl disable openstack-storlets-gateway
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure of Storlets service
- Deploy application-level firewalls or WAF rules to monitor and block suspicious requests to gateway.py
🔍 How to Verify
Check if Vulnerable:
Check if OpenStack Storlets yoga-eom version is running and gateway.py component is accessible
Check Version:
openstack --version | grep storlets OR check package manager: rpm -qa | grep storlets OR dpkg -l | grep storlets
Verify Fix Applied:
Verify OpenStack Storlets has been updated to patched version and test for vulnerability using security scanning tools
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to gateway.py endpoint
- Suspicious command execution patterns in system logs
- Unexpected process creation from Storlets service
Network Indicators:
- Anomalous traffic to Storlets service port
- Unexpected outbound connections from Storlets host
SIEM Query:
source="storlets.log" AND ("gateway.py" OR "exec" OR "system")
🔗 References
- https://bugs.launchpad.net/solum/+bug/2047505
- https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link
- https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f
- https://bugs.launchpad.net/solum/+bug/2047505
- https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link
- https://gist.github.com/Fewword/f098d8d6375ac25e27b18c0e57be532f