SOAP Web Services Privilege Escalation Vulnerability
A security vulnerability has been identified in the implementation of the SOAP interface exposed by front-end components in Eucalyptus 3.1.0 and earlier. An update is now available that resolves this issue. We advise immediately updating all affected Eucalyptus installations following the instructions below.
Eucalyptus front-end components (Cloud Controller and Walrus) can be accessed using the SOAP web services messaging protocol. A flaw was found in an implementation that binds external SOAP messages to internal representation, that allowed a user with valid Eucalyptus credentials to submit messages in the internal format via external services. An external user could use this flaw to escalate privileges by injecting an effective user id, respected on some code paths, into internal messages. As a result, a malicious user with valid Eucalyptus credentials could perform certain operations with privileges of Eucalyptus admin user and, in some cases, gain root privileges on the Eucalyptus host.
This issue is resolved in Eucalyptus version 3.1.1.
Please see https://www.eucalyptus.com/download/eucalyptus for instructions on downloading and upgrading to the latest Eucalyptus software.
Contact and help
Contact the Eucalyptus security team at email@example.com.