An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
9
Affected Products
9
References
openstack / cinder
| - |
| openstack | glance | 26.0.1 | - |
| openstack | glance | 28.0.0 - 28.0.2 | - |
| openstack | glance | - | - |
| openstack | nova | 27.3.1 | - |
| openstack | nova | 28.0.0 - 28.1.1 | - |
| openstack | nova | 29.0.0 - 29.0.3 | - |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact