SOAP Web Services Privilege Escalation Vulnerability
A security vulnerability has been identified in the implementation of the SOAP interface exposed by front-end components in HP Helion Eucalyptus 3.1.0 and earlier. An update is now available that resolves this issue. We advise immediately updating all affected HP Helion Eucalyptus installations following the instructions below.
HP Helion Eucalyptus front-end components (Cloud Controller and Walrus) can be accessed using the SOAP web services messaging protocol. A flaw was found in an implementation that binds external SOAP messages to internal representation, that allowed a user with valid HP Helion Eucalyptus credentials to submit messages in the internal format via external services. An external user could use this flaw to escalate privileges by injecting an effective user id, respected on some code paths, into internal messages. As a result, a malicious user with valid HP Helion Eucalyptus credentials could perform certain operations with privileges of HP Helion Eucalyptus admin user and, in some cases, gain root privileges on the HP Helion Eucalyptus host.
This issue is resolved in HP Helion Eucalyptus version 3.1.1.
Please see https://www.eucalyptus.com/download/eucalyptus for instructions on downloading and upgrading to the latest HP Helion Eucalyptus software.
Contact and help
Contact the HP Helion Eucalyptus security team at firstname.lastname@example.org.