security risk local file include (LFI)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mistral |
New
|
Undecided
|
Unassigned |
Bug Description
Hello all,
I've found one security vulnerability of mistral project as described below.
Environment:
Openstack version Yoga.
Step to reproduce:
1. Go to mistral-dashboard
Workflow > Workbooks > Create Workbook > Direct Input
Workflow > Workflows > Create Workflows > Direct Input
Workfloư > Actions > Create Action > Direct Input
2. Input string: "/etc/environment" or "/etc/passwd"
3. Then click Validate and the mistral response all the data of that file
I also attached the example response with data of file "/etc/environment" on my testing environment. The attacker can leverage this bug to get content of very sensitive data from the server side of the OpenStack control-plane so I hope we can eliminate this as soon as possible.
information type: | Private Security → Public |
information type: | Public → Public Security |