VYPR
Moderate severityNVD Advisory· Published Jul 24, 2024· Updated Nov 4, 2025

CVE-2024-40767

CVE-2024-40767

Description

In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated OpenStack users can read arbitrary server files by uploading crafted disk images that exploit incomplete fixes for earlier path-traversal vulnerabilities.

Root

Cause

CVE-2024-40767 is a path-traversal vulnerability in OpenStack Nova that arises from incomplete fixes for two prior CVEs: CVE-2022-47951 and CVE-2024-32498 [1][4]. When Nova handles raw-format images, it does not sufficiently validate that the supplied file is actually a raw image; an attacker can upload a crafted QCOW2 image that specifies a backing file path or a VMDK flat image containing a descriptor file path [2]. These paths can point to arbitrary files on the server's filesystem.

Exploitation

An authenticated OpenStack user can upload such a crafted image (e.g., a QCOW2 file with a backing file set to /etc/hosts or a VMDK with a descriptor file pointing at the same) and then boot an instance from that image [2]. The Nova compute service, when preparing the instance disk, will follow the embedded path and access the target file. The attack requires only standard user credentials for image upload and instance boot; no administrative privileges or special network access are needed [1][4].

Impact

Successful exploitation allows an authenticated user to read arbitrary files from the Nova compute node's filesystem. Sensitive data, such as configuration files, cryptographic keys, or other secrets accessible to the Nova process, can be exfiltrated [1][4]. The vulnerability affects all Nova deployments, including those that had previously applied fixes for the related CVEs [1].

Mitigation

Red Hat and the OpenStack project have released patched versions: Nova 27.4.1, 28.2.1, and 29.1.1 [1][4]. Operators should upgrade to these or later versions immediately. The fix strengthens image format validation to detect and reject crafted QCOW2 and VMDK files that attempt to specify backing or descriptor file paths outside of allowed boundaries [2][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
NovaPyPI
<= 27.4.0
NovaPyPI
>= 28.0.0, <= 28.2.0
NovaPyPI
>= 29.0.0, <= 29.1.0

Affected products

2
  • OpenStack/Novadescription
  • ghsa-coords
    Range: <= 27.4.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.