Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mistral project for reporting this issue.", "affected_release": [{"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "instack-undercloud-0:8.4.6-6.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-mistral-0:6.0.6-2.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-common-0:8.6.6-16.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-heat-templates-0:8.2.0-6.1.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-image-elements-0:8.0.1-3.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-puppet-elements-0:8.0.1-2.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-ui-0:8.3.2-3.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "openstack-tripleo-validations-0:8.4.4-2.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "os-net-config-0:8.4.3-6.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "os-refresh-config-0:8.3.1-0.20180918214345.4703b54.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-cinder-0:12.4.1-3.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-keystone-0:12.4.0-4.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-manila-0:12.5.0-3.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-neutron-0:12.4.1-4.ed05e01git.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-nova-0:12.4.0-16.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-octavia-0:12.4.0-8.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-opendaylight-0:8.2.2-5.9126c8dgit.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-ovn-0:12.4.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-pacemaker-0:0.7.2-0.20180423212257.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-swift-0:12.4.0-4.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "puppet-tripleo-0:8.3.6-15.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "python-os-brick-0:2.3.4-2.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}, {"advisory": "RHBA-2019:0448", "cpe": "cpe:/a:redhat:openstack:13::el7", "package": "python-tripleoclient-0:9.2.6-8.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", "release_date": "2019-03-14T00:00:00Z"}], "bugzilla": {"description": "openstack-mistral: std.ssh action may disclose presence of arbitrary files", "id": "1645334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645334"}, "csaw": false, "cvss3": {"cvss3_base_score": "4.3", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "status": "verified"}, "cwe": "CWE-200", "details": ["A flaw was found in openstack-mistral. By manipulating the SSH private key filename, the std.ssh action can be used to disclose the presence of arbitrary files within the filesystem of the executor running the action. Since std.ssh private_key_filename can take an absolute path, it can be used to assess whether or not a file exists on the executor's filesystem.", "An information-disclosure flaw was discovered in openstack-mistral, where the SSH private key filename of a std.ssh action could be manipulated. The flaw could be exploited to determine the presence of a file path on the host executing the std.ssh action, based on the returned error message."], "name": "CVE-2018-16849", "package_state": [{"cpe": "cpe:/a:redhat:openstack:14", "fix_state": "Out of support scope", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 14 (Rocky)"}, {"cpe": "cpe:/a:redhat:openstack:15", "fix_state": "Affected", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 15 (Stein)"}], "public_date": "2018-11-02T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-16849\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-16849"], "threat_severity": "Moderate"}