SOAP Web Services Authorization Bypass Vulnerability
A security vulnerability has been identified in the implementation of the SOAP interface exposed by front-end components in HP Helion Eucalyptus 3.1.0 and earlier. An update is now available that resolves this issue. We advise immediately updating all affected HP Helion Eucalyptus installations following the instructions below.
HP Helion Eucalyptus front-end components (Cloud Controler and Walrus) can be accessed using a SOAP web services messaging protocol. A flaw was found in the implementation that binds external SOAP messages to internal services. This flaw allowed users with valid HP Helion Eucalyptus credentials to bypass existing authorization mechanisms for some services that should not be directly accessible by external users. As a result, a malicious user could perform privileged operations, such as manipulating volumes and snapshots belonging to other users or modifying the HP Helion Eucalyptus cloud configuration.
This issue is resolved in HP Helion Eucalyptus version 3.1.1.
Please see https://www.eucalyptus.com/download/eucalyptus for instructions on downloading and upgrading to the latest HP Helion Eucalyptus software.
Contact and help
Contact the HP Helion Eucalyptus security team at firstname.lastname@example.org.