All the vulnerabilites related to openstack - swift
Vulnerability from fkie_nvd
Published
2015-10-26 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "8667E372-45EC-4D3D-98B5-975CBEA8353E", "versionEndIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container." }, { "lang": "es", "value": "OpenStack Object Storage (Swift) en versiones anteriores a 2.4.0 permite a atacantes obtener informaci\u00f3n sensible a trav\u00e9s de un PUT tempurl y un manifiesto de objeto DLO que hace referencia a un objeto en otro contenedor." } ], "id": "CVE-2015-5223", "lastModified": "2024-11-21T02:32:35.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-26T17:59:05.483", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1895.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2015/08/26/5" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/84827" }, { "source": "secalert@redhat.com", "url": "https://bugs.launchpad.net/swift/+bug/1449212" }, { "source": "secalert@redhat.com", "url": "https://bugs.launchpad.net/swift/+bug/1453948" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2015-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1895.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/08/26/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/84827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/swift/+bug/1449212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/swift/+bug/1453948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2015-016.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-03 17:55
Modified
2024-11-21 02:08
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8597C3D7-2CFA-439B-82D6-2A651F74E5BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8EFF63A3-C15C-49A2-AD88-CAA98184C1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "433EDE19-9BF8-4736-B792-EEE1296114D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "67675C43-C258-41DE-BD75-CC5E2168E82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.13.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "9E41D234-69D2-47C9-B0CB-E8FA80CF1623", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.13.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "24229BAF-FF4A-4ACF-9379-74D104F5E558", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header." }, { "lang": "es", "value": "Vulnerabilidad de XSS en OpenStack Swift 1.11.0 hasta 1.13.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de la cabecera WWW-Authenticate." } ], "id": "CVE-2014-3497", "lastModified": "2024-11-21T02:08:14.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-03T17:55:06.030", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59532" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2014/06/19/10" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/68116" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2256-1" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/101031/" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/101032/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/06/19/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/68116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2256-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/101031/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/101032/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-23 01:55
Modified
2024-11-21 02:01
Severity ?
Summary
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | swift | 1.4.6 | |
openstack | swift | 1.4.7 | |
openstack | swift | 1.4.8 | |
openstack | swift | 1.5.0 | |
openstack | swift | 1.6.0 | |
openstack | swift | 1.7.0 | |
openstack | swift | 1.7.2 | |
openstack | swift | 1.7.4 | |
openstack | swift | 1.7.5 | |
openstack | swift | 1.7.6 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.9.0 | |
openstack | swift | 1.9.1 | |
openstack | swift | 1.9.2 | |
openstack | swift | 1.10.0 | |
openstack | swift | 1.11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9F65289A-8F41-4DFC-9B7E-C45F2A572C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3EE50F0A-4411-48AC-89DD-530B44C46256", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0CF91F03-51B1-4CF6-AE2A-2A03CFE2000A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3697251-8EEA-4458-9717-155EAD0915F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A118EA-10DD-4B99-9B49-9A36580C44CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42DBA52-96EE-4662-8CB2-C2606E75CBA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "29F37244-947C-479B-9F52-5D22BC5276EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9ED958FC-7275-4CF5-90A7-D05ACE84B523", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "945E4B61-33E9-4578-B778-231ACD281A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "953ED594-AF1B-4580-BC8D-05EF3CD71F6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2743AB4B-6A56-4E86-A5D7-3D1066032202", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "88450C19-E1A9-4FA5-B29E-E6A91D10B606", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "46585CF1-B9BE-4CAC-9ED1-F7F1F191C042", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "E2F18A12-1992-42A7-B92E-1E4164215504", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "50846E0D-A4A7-440E-9E89-897DA8492889", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8597C3D7-2CFA-439B-82D6-2A651F74E5BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack." }, { "lang": "es", "value": "El middleware TempURL de OpenStack Object Storage (Swift) 1.4.6 hasta la versi\u00f3n 1.8.0, 1.9.0 hasta 1.10.0 y 1.11.0 permite a atacantes remotos obtener URLs secretas mediante el aprovechamiento de un nombre de objeto y un ataque de canal lateral basado en an\u00e1lisis de tiempo." } ], "id": "CVE-2014-0006", "lastModified": "2024-11-21T02:01:09.533", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-23T01:55:04.007", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0232.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/01/17/5" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1265665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0232.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/01/17/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1265665" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-22 21:55
Modified
2024-11-21 01:50
Severity ?
Summary
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:glance:v1:*:*:*:*:*:*:*", "matchCriteriaId": "3E39288B-D80F-493D-BD2A-6A749EBCE0AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5FDB43F-B315-4F68-9D86-B644F2D4DF9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*", "matchCriteriaId": "E76B76AB-D744-4163-8615-7BA18ABB1347", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:amazon:s3_store:-:*:*:*:*:*:*:*", "matchCriteriaId": "05BC26BF-62C4-47E9-81B1-C968904F1FF2", "vulnerable": false }, { "criteria": "cpe:2.3:a:openstack:swift:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE675165-BF5F-4BB3-964F-777CC3DDFF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator\u0027s backend credentials via a request for a cached image." }, { "lang": "es", "value": "La API v1 en OpenStack Vistazo Essex (2012.1), Folsom (2012.2) y Grizzly, al utilizar el \u0027single-tenant Swift\u0027 o la tienda S3, informa el campo de ubicaci\u00f3n, lo que permite obtener las credenciales del back-end del operador a usuarios remotos autenticados a trav\u00e9s de una solicitud de una imagen almacenada en cach\u00e9." } ], "id": "CVE-2013-1840", "lastModified": "2024-11-21T01:50:29.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-22T21:55:01.487", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/91304" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52565" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/03/14/15" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/58490" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1764-1" }, { "source": "secalert@redhat.com", "url": "https://bugs.launchpad.net/glance/+bug/1135541" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/24437/" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/24438/" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/24439/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/91304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/03/14/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/58490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1764-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/glance/+bug/1135541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/24437/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/24438/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/24439/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-17 17:59
Modified
2024-11-21 02:26
Severity ?
Summary
OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | swift | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "980868A4-9907-4C42-BE53-B9CDA4DAF944", "versionEndIncluding": "2.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container." }, { "lang": "es", "value": "OpenStack Object Storage (Swift) anterior a 2.3.0, cuando allow_version est\u00e1 configurado, permite a usuarios remotos autenticados eliminar la \u00faltima versi\u00f3n de un objeto mediante el aprovechamiento del acceso listado al contenedor de la localizaci\u00f3n de versiones x." } ], "id": "CVE-2015-1856", "lastModified": "2024-11-21T02:26:16.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-17T17:59:03.887", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1681.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1684.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1845.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1846.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74182" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1430645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1681.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1684.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1845.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1846.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1430645" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-18 17:15
Modified
2024-11-21 07:32
Severity ?
Summary
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://launchpad.net/bugs/1998625 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.openstack.org/ossa/OSSA-2023-001.html | Patch, Vendor Advisory | |
cve@mitre.org | https://www.debian.org/security/2023/dsa-5327 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1998625 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.openstack.org/ossa/OSSA-2023-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5327 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "5960CC54-9C52-4C0E-98E6-6BC47A76BD6D", "versionEndExcluding": "2.28.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CD6B1FC-5309-430C-B68B-5CA53769F764", "versionEndExcluding": "2.29.2", "versionStartIncluding": "2.29.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:2.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB932AB6-E5AA-4B1B-A8BB-CBA2310FD9F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed)." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en OpenStack Swift anterior a 2.28.1, 2.29.x anterior a 2.29.2 y 2.30.0. Al proporcionar archivos XML manipulados, un usuario autenticado puede obligar a la API de S3 a devolver contenidos de archivos arbitrarios desde el servidor host, lo que resulta en un acceso de lectura no autorizado a datos potencialmente confidenciales. Esto afecta tanto a las implementaciones de s3api (Rocky o posterior) como a las implementaciones de swift3 (Queens y anteriores, que ya no se desarrollan activamente)." } ], "id": "CVE-2022-47950", "lastModified": "2024-11-21T07:32:37.363", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-18T17:15:10.290", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://launchpad.net/bugs/1998625" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2023-001.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2023/dsa-5327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://launchpad.net/bugs/1998625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2023-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5327" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-02 14:15
Modified
2024-11-21 03:34
Severity ?
Summary
In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://launchpad.net/bugs/1685798 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1685798 | Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "65898588-B51B-4705-AC87-B287ED51710E", "versionEndIncluding": "2.10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB647119-891D-4DEB-964C-FD41C012C87A", "versionEndIncluding": "2.13.0", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:2.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "65B68489-C6F2-4BF1-B5CC-4257615C2CCD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected." }, { "lang": "es", "value": "En OpenStack Swift versiones hasta 2.10.1, versiones 2.11.0 hasta 2.13.0 y la versi\u00f3n 2.14.0, el servidor proxy registra las rutas tempurl completas, potencialmente filtrando firmas tempurl reutilizables a cualquiera que tenga acceso a estos registros. Todas las implantaciones de Swift que usen el middleware tempurl est\u00e1n afectadas" } ], "id": "CVE-2017-8761", "lastModified": "2024-11-21T03:34:38.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-02T14:15:07.753", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://launchpad.net/bugs/1685798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://launchpad.net/bugs/1685798" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-01-29 20:59
Modified
2024-11-21 02:42
Severity ?
Summary
OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "8667E372-45EC-4D3D-98B5-975CBEA8353E", "versionEndIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL." }, { "lang": "es", "value": "OpenStack Object Storage (Swift) en versiones anteriores a 2.4.0 no cierra correctamente las conexionen del cliente, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de recursos del servidor proxy) a trav\u00e9s de una serie de peticiones interrumpidas a una URL Large Object." } ], "id": "CVE-2016-0737", "lastModified": "2024-11-21T02:42:16.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-29T20:59:02.920", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/81432" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1466549" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://launchpad.net/swift/+milestone/2.4.0" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/217750/" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/81432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1466549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://launchpad.net/swift/+milestone/2.4.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/217750/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-22 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | swift | * | |
fedoraproject | fedora | 16 | |
redhat | gluster_storage_management_console | 2.0 | |
redhat | gluster_storage_server_for_on-premise | 2.0 | |
redhat | storage | 2.0 | |
redhat | storage_for_public_cloud | 2.0 | |
redhat | enterprise_linux_server | 5.0 | |
redhat | enterprise_linux_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD5D7F7C-3474-4354-8531-CC28D6F3B635", "versionEndExcluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0923F044-C68D-4A4A-96E1-C498F3A77C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "59D47E43-886E-4114-96A2-DBE719EA3A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "52B90A04-DD6D-4AE7-A0E5-6B381127D507", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0257753-51C3-45F2-BAA4-4C1F2DEAB7A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object." }, { "lang": "es", "value": "OpenStack Object Storage (swift) antes de v1.7.0 utiliza la funci\u00f3n loads en el m\u00f3dulo pickle de Python de forma no segura al almacenar y cargar los metadatos en memcached, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto pickle modificado." } ], "id": "CVE-2012-4406", "lastModified": "2024-11-21T01:42:49.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2012-10-22T23:55:06.743", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1379.html" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0691.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/16" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/4" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/55420" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugs.launchpad.net/swift/+bug/1006414" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes" ], "url": "https://launchpad.net/swift/+milestone/1.7.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1379.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0691.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/55420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugs.launchpad.net/swift/+bug/1006414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://launchpad.net/swift/+milestone/1.7.0" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-17 15:55
Modified
2024-11-21 02:18
Severity ?
Summary
OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "47DD32D7-6851-443D-B97D-A1E6D2E8CDB2", "versionEndIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined." }, { "lang": "es", "value": "OpenStack Object Storage (Swift) anterior a 2.2.0 permite a usuarios remotos autenticados evadir las restricciones max_meta_count y otros metadatos a trav\u00e9s de m\u00falitples peticiones manipuladas que exceden el l\u00edmite cuando \u00e9stas se combinan." } ], "id": "CVE-2014-7960", "lastModified": "2024-11-21T02:18:20.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-17T15:55:06.713", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70279" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-18 19:55
Modified
2024-11-21 01:59
Severity ?
Summary
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | swift | 1.0.0 | |
openstack | swift | 1.0.1 | |
openstack | swift | 1.0.2 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.4.0 | |
openstack | swift | 1.4.1 | |
openstack | swift | 1.4.2 | |
openstack | swift | 1.4.3 | |
openstack | swift | 1.4.4 | |
openstack | swift | 1.4.5 | |
openstack | swift | 1.4.6 | |
openstack | swift | 1.4.7 | |
openstack | swift | 1.4.8 | |
openstack | swift | 1.5.0 | |
openstack | swift | 1.6.0 | |
openstack | swift | 1.7.0 | |
openstack | swift | 1.7.2 | |
openstack | swift | 1.7.4 | |
openstack | swift | 1.7.5 | |
openstack | swift | 1.7.6 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.9.0 | |
openstack | swift | 1.10.0 | |
openstack | swift | 1.11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3363F1D-E377-4884-A982-95C16230282E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "09BA82A3-AD2E-4767-AC55-B77112E1E8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B48FA39-ACAC-4176-954A-E244E5C40B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E05C078-59BA-42E9-B46D-EA2F1A7A3AC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D4E8964-8F13-4202-B8FC-803C55E4DD07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A22B59DB-7F87-4FAD-B717-3636887FFB0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "01DD589E-25BC-4189-AC9C-3C339B64CBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:gamma1:*:*:*:*:*:*", "matchCriteriaId": "D752F8FE-8B75-412A-997E-C276B61E5A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "04839CE3-2C55-4A95-A569-DB33C38EDCB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "77C700EB-E00A-49B3-8A73-E075CEC3D60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:gamma1:*:*:*:*:*:*", "matchCriteriaId": "6AAF1C7D-65A2-4DDD-B9DF-E947DE7D9394", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FB71CE04-A7C2-4859-A95B-61E9FC27D955", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FA8EC8C-E00A-4E0D-BAF4-3EA0F6D0542D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "190BEFEB-F468-44DD-8E5B-44AC6586E8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "673B78FE-6D79-4603-AF96-14654B87D6DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "349679DF-B0AB-4238-8DA5-383FE1D1E595", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BF8C72E-C20B-4A1B-A2CA-9FB39BBD3F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4F16BA8-B732-4633-A1F5-244482249B11", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9F65289A-8F41-4DFC-9B7E-C45F2A572C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3EE50F0A-4411-48AC-89DD-530B44C46256", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0CF91F03-51B1-4CF6-AE2A-2A03CFE2000A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3697251-8EEA-4458-9717-155EAD0915F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A118EA-10DD-4B99-9B49-9A36580C44CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42DBA52-96EE-4662-8CB2-C2606E75CBA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "29F37244-947C-479B-9F52-5D22BC5276EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9ED958FC-7275-4CF5-90A7-D05ACE84B523", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "945E4B61-33E9-4578-B778-231ACD281A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "953ED594-AF1B-4580-BC8D-05EF3CD71F6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2743AB4B-6A56-4E86-A5D7-3D1066032202", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5928EF1B-B236-475A-B204-82CAA30B1E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "33075789-58EE-4A71-8BA1-C3A515248DE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "88450C19-E1A9-4FA5-B29E-E6A91D10B606", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "50846E0D-A4A7-440E-9E89-897DA8492889", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8597C3D7-2CFA-439B-82D6-2A651F74E5BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." }, { "lang": "es", "value": "La librer\u00eda del cliente Python de OpenStack para Swift (python-swiftclient) 1.0 hasta 1.9.0 no verifica los certificados X.509 provenientes de los servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado." } ], "id": "CVE-2013-6396", "lastModified": "2024-11-21T01:59:08.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-18T19:55:04.313", "references": [ { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2014/02/17/7" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/python-swiftclient/+bug/1199783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/02/17/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/python-swiftclient/+bug/1199783" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-01-29 20:59
Modified
2024-11-21 02:42
Severity ?
Summary
OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "8667E372-45EC-4D3D-98B5-975CBEA8353E", "versionEndIncluding": "2.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D4A9A58-8664-4211-B418-7CCE44F8DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC00C1AA-8DBA-40D8-BA88-D1D6C160D67B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL." }, { "lang": "es", "value": "OpenStack Object Storage (Swift) en versiones anteriores a 2.3.1 (Kilo), 2.4.x y 2.5.x en versiones anteriores a 2.5.1 (Liberty) no cierra correctamente las conexiones de servidor, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de recursos del servidor proxy) a trav\u00e9s de una serie de peticiones interrumpidas a una URL Large Object." } ], "id": "CVE-2016-0738", "lastModified": "2024-11-21T02:42:17.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-29T20:59:03.810", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/81432" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/cloud-archive/+bug/1493303" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/openstack/swift/blob/master/CHANGELOG" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/81432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.launchpad.net/cloud-archive/+bug/1493303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/openstack/swift/blob/master/CHANGELOG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 13:29
Modified
2024-11-21 03:16
Severity ?
Summary
An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swauth:*:*:*:*:*:*:*:*", "matchCriteriaId": "569523A9-D620-4EBF-A80E-F920C81D96ED", "versionEndIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC9FBBDE-80EF-4E50-B65B-D2EB7FAF3CF3", "versionEndIncluding": "2.15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en middleware.py en OpenStack Swauth hasta la versi\u00f3n 1.2.0 cuando se utiliza con OpenStack Swift hasta la versi\u00f3n 2.15.1. El servidor proxy y el almac\u00e9n de objetos de Swift guardan los tokens (sin los hashes correspondientes) que se recuperan del mecanismo de autenticaci\u00f3n de middleware de Swauth en un archivo de log como parte de una URI GET. Esto permite que los atacantes omitan la autenticaci\u00f3n insertando un token en una cabecera X-Auth-Token de una nueva petici\u00f3n. NOTA: las URL de github.com/openstack/swauth no quieren decir que hay un equipo oficial del proyecto OpenStack que mantenga Swauth." } ], "id": "CVE-2017-16613", "lastModified": "2024-11-21T03:16:42.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T13:29:00.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101926" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1655781" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/swift/+bug/1655781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4044" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-08-20 22:55
Modified
2024-11-21 01:54
Severity ?
Summary
OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | folsom | - | |
openstack | grizzly | - | |
openstack | havana | - | |
openstack | swift | * | |
openstack | swift | 1.0.0 | |
openstack | swift | 1.0.1 | |
openstack | swift | 1.0.2 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.1.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.2.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.3.0 | |
openstack | swift | 1.4.0 | |
openstack | swift | 1.4.1 | |
openstack | swift | 1.4.2 | |
openstack | swift | 1.4.3 | |
openstack | swift | 1.4.4 | |
openstack | swift | 1.4.5 | |
openstack | swift | 1.4.6 | |
openstack | swift | 1.4.7 | |
openstack | swift | 1.4.8 | |
openstack | swift | 1.5.0 | |
openstack | swift | 1.6.0 | |
openstack | swift | 1.7.0 | |
openstack | swift | 1.7.2 | |
openstack | swift | 1.7.4 | |
openstack | swift | 1.7.5 | |
openstack | swift | 1.7.6 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.8.0 | |
openstack | swift | 1.8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5BA13BC-F088-45AA-AD10-B74F89CE5375", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:grizzly:-:*:*:*:*:*:*:*", "matchCriteriaId": "A83ED744-9E3D-4510-B3E6-6DDE1090F0B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:havana:-:*:*:*:*:*:*:*", "matchCriteriaId": "77522028-683C-4708-AF46-50B49A0A2D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E81B0AB-FE07-480C-AA06-7123D158A01F", "versionEndIncluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3363F1D-E377-4884-A982-95C16230282E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "09BA82A3-AD2E-4767-AC55-B77112E1E8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B48FA39-ACAC-4176-954A-E244E5C40B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E05C078-59BA-42E9-B46D-EA2F1A7A3AC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D4E8964-8F13-4202-B8FC-803C55E4DD07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A22B59DB-7F87-4FAD-B717-3636887FFB0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "01DD589E-25BC-4189-AC9C-3C339B64CBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:gamma1:*:*:*:*:*:*", "matchCriteriaId": "D752F8FE-8B75-412A-997E-C276B61E5A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "04839CE3-2C55-4A95-A569-DB33C38EDCB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "77C700EB-E00A-49B3-8A73-E075CEC3D60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:gamma1:*:*:*:*:*:*", "matchCriteriaId": "6AAF1C7D-65A2-4DDD-B9DF-E947DE7D9394", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FB71CE04-A7C2-4859-A95B-61E9FC27D955", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FA8EC8C-E00A-4E0D-BAF4-3EA0F6D0542D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "190BEFEB-F468-44DD-8E5B-44AC6586E8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "673B78FE-6D79-4603-AF96-14654B87D6DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "349679DF-B0AB-4238-8DA5-383FE1D1E595", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BF8C72E-C20B-4A1B-A2CA-9FB39BBD3F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4F16BA8-B732-4633-A1F5-244482249B11", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9F65289A-8F41-4DFC-9B7E-C45F2A572C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3EE50F0A-4411-48AC-89DD-530B44C46256", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0CF91F03-51B1-4CF6-AE2A-2A03CFE2000A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3697251-8EEA-4458-9717-155EAD0915F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A118EA-10DD-4B99-9B49-9A36580C44CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42DBA52-96EE-4662-8CB2-C2606E75CBA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "29F37244-947C-479B-9F52-5D22BC5276EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9ED958FC-7275-4CF5-90A7-D05ACE84B523", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "945E4B61-33E9-4578-B778-231ACD281A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "953ED594-AF1B-4580-BC8D-05EF3CD71F6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2743AB4B-6A56-4E86-A5D7-3D1066032202", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5928EF1B-B236-475A-B204-82CAA30B1E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "33075789-58EE-4A71-8BA1-C3A515248DE4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service (\"superfluous\" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected." }, { "lang": "es", "value": "OpenStack Swift nateior a 1.9.1 en Folsom, Grizzly, y Havana, permite a usuarios autenticados provocar una denegaci\u00f3n de servicio (consumo superfluo de tombstone y desaceleraci\u00f3n del cl\u00faster Swift) a trav\u00e9s de una petici\u00f3n DELETE con un timestamp que es m\u00e1s antiguo que el esperado." } ], "id": "CVE-2013-4155", "lastModified": "2024-11-21T01:54:59.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-20T22:55:04.260", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1197.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2737" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/08/07/6" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2001-1" }, { "source": "secalert@redhat.com", "url": "https://bugs.launchpad.net/swift/+bug/1196932" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/40643/" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/40645/" }, { "source": "secalert@redhat.com", "url": "https://review.openstack.org/#/c/40646/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/08/07/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2001-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/swift/+bug/1196932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/40643/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/40645/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://review.openstack.org/#/c/40646/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2014-3497
Vulnerability from cvelistv5
Published
2014-07-03 17:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2256-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/59532 | third-party-advisory, x_refsource_SECUNIA | |
https://review.openstack.org/#/c/101031/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/06/19/10 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/68116 | vdb-entry, x_refsource_BID | |
http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html | mailing-list, x_refsource_MLIST | |
https://review.openstack.org/#/c/101032/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2256-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2256-1" }, { "name": "59532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59532" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/101031/" }, { "name": "[oss-security] 20140619 [OSSA 2014-020] XSS in Swift requests through WWW-Authenticate header (CVE-2014-3497)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/19/10" }, { "name": "68116", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68116" }, { "name": "[openstack-announce] 20140619 [OSSA 2014-020] XSS in Swift requests through WWW-Authenticate header (CVE-2014-3497)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/101032/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-04T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2256-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2256-1" }, { "name": "59532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59532" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/101031/" }, { "name": "[oss-security] 20140619 [OSSA 2014-020] XSS in Swift requests through WWW-Authenticate header (CVE-2014-3497)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/19/10" }, { "name": "68116", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68116" }, { "name": "[openstack-announce] 20140619 [OSSA 2014-020] XSS in Swift requests through WWW-Authenticate header (CVE-2014-3497)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/101032/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3497", "datePublished": "2014-07-03T17:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0006
Vulnerability from cvelistv5
Published
2014-01-23 01:00
Modified
2024-08-06 08:58
Severity ?
EPSS score ?
Summary
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0232.html | vendor-advisory, x_refsource_REDHAT | |
https://bugs.launchpad.net/swift/+bug/1265665 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/01/17/5 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2014:0232", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1265665" }, { "name": "[oss-security] 20140117 [OSSA 2014-002] Swift TempURL timing attack (CVE-2014-0006)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/01/17/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2014:0232", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1265665" }, { "name": "[oss-security] 20140117 [OSSA 2014-002] Swift TempURL timing attack (CVE-2014-0006)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/01/17/5" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0006", "datePublished": "2014-01-23T01:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T08:58:26.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47950
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2024-08-03 15:02
Severity ?
EPSS score ?
Summary
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://launchpad.net/bugs/1998625" }, { "tags": [ "x_transferred" ], "url": "https://security.openstack.org/ossa/OSSA-2023-001.html" }, { "name": "[debian-lts-announce] 20230125 [SECURITY] [DLA 3281-1] swift security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html" }, { "name": "DSA-5327", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5327" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://launchpad.net/bugs/1998625" }, { "url": "https://security.openstack.org/ossa/OSSA-2023-001.html" }, { "name": "[debian-lts-announce] 20230125 [SECURITY] [DLA 3281-1] swift security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html" }, { "name": "DSA-5327", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5327" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-47950", "datePublished": "2023-01-18T00:00:00", "dateReserved": "2022-12-24T00:00:00", "dateUpdated": "2024-08-03T15:02:36.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4406
Vulnerability from cvelistv5
Published
2012-10-22 23:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
References
▼ | URL | Tags |
---|---|---|
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/55420 | vdb-entry, x_refsource_BID | |
https://launchpad.net/swift/+milestone/1.7.0 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2012-1379.html | vendor-advisory, x_refsource_REDHAT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79140 | vdb-entry, x_refsource_XF | |
https://bugs.launchpad.net/swift/+bug/1006414 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=854757 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/09/05/4 | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html | vendor-advisory, x_refsource_FEDORA | |
http://rhn.redhat.com/errata/RHSA-2013-0691.html | vendor-advisory, x_refsource_REDHAT | |
http://www.openwall.com/lists/oss-security/2012/09/05/16 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a" }, { "name": "55420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.net/swift/+milestone/1.7.0" }, { "name": "RHSA-2012:1379", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1379.html" }, { "name": "openstack-swift-loads-code-exec(79140)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1006414" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757" }, { "name": "[oss-security] 20120905 CVE-Request: openstack pickle de-serialization", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/4" }, { "name": "FEDORA-2012-15098", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html" }, { "name": "RHSA-2013:0691", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0691.html" }, { "name": "[oss-security] 20120905 Re: CVE-Request: openstack pickle de-serialization", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a" }, { "name": "55420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.net/swift/+milestone/1.7.0" }, { "name": "RHSA-2012:1379", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1379.html" }, { "name": "openstack-swift-loads-code-exec(79140)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1006414" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757" }, { "name": "[oss-security] 20120905 CVE-Request: openstack pickle de-serialization", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/4" }, { "name": "FEDORA-2012-15098", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html" }, { "name": "RHSA-2013:0691", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0691.html" }, { "name": "[oss-security] 20120905 Re: CVE-Request: openstack pickle de-serialization", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/16" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4406", "datePublished": "2012-10-22T23:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1856
Vulnerability from cvelistv5
Published
2015-04-17 17:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-1845.html | vendor-advisory, x_refsource_REDHAT | |
https://bugs.launchpad.net/swift/+bug/1430645 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2015-1846.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2015-1681.html | vendor-advisory, x_refsource_REDHAT | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2704-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/74182 | vdb-entry, x_refsource_BID | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html | mailing-list, x_refsource_MLIST | |
http://rhn.redhat.com/errata/RHSA-2015-1684.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1845", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1845.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1430645" }, { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "name": "RHSA-2015:1846", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1846.html" }, { "name": "RHSA-2015:1681", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1681.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "USN-2704-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "name": "74182", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74182" }, { "name": "FEDORA-2015-12245", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html" }, { "name": "[openstack-announce] 20150414 [OSSA 2015-006] Unauthorized delete of versioned Swift object (CVE-2015-1856)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html" }, { "name": "RHSA-2015:1684", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1684.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1845", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1845.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1430645" }, { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "name": "RHSA-2015:1846", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1846.html" }, { "name": "RHSA-2015:1681", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1681.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "USN-2704-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "name": "74182", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74182" }, { "name": "FEDORA-2015-12245", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html" }, { "name": "[openstack-announce] 20150414 [OSSA 2015-006] Unauthorized delete of versioned Swift object (CVE-2015-1856)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html" }, { "name": "RHSA-2015:1684", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1684.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1856", "datePublished": "2015-04-17T17:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0737
Vulnerability from cvelistv5
Published
2016-01-29 20:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-0329.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/81432 | vdb-entry, x_refsource_BID | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-0128.html | vendor-advisory, x_refsource_REDHAT | |
https://review.openstack.org/#/c/217750/ | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-0155.html | vendor-advisory, x_refsource_REDHAT | |
https://bugs.launchpad.net/swift/+bug/1466549 | x_refsource_CONFIRM | |
https://security.openstack.org/ossa/OSSA-2016-004.html | x_refsource_CONFIRM | |
https://launchpad.net/swift/+milestone/2.4.0 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "name": "81432", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/81432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "RHSA-2016:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/217750/" }, { "name": "RHSA-2016:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1466549" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.net/swift/+milestone/2.4.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "name": "81432", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/81432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "RHSA-2016:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/217750/" }, { "name": "RHSA-2016:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1466549" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.net/swift/+milestone/2.4.0" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0737", "datePublished": "2016-01-29T20:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1840
Vulnerability from cvelistv5
Published
2013-03-22 21:00
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/82878 | vdb-entry, x_refsource_XF | |
https://review.openstack.org/#/c/24437/ | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-1764-1 | vendor-advisory, x_refsource_UBUNTU | |
https://review.openstack.org/#/c/24438/ | x_refsource_CONFIRM | |
https://bugs.launchpad.net/glance/+bug/1135541 | x_refsource_CONFIRM | |
http://secunia.com/advisories/52565 | third-party-advisory, x_refsource_SECUNIA | |
http://rhn.redhat.com/errata/RHSA-2013-0707.html | vendor-advisory, x_refsource_REDHAT | |
http://osvdb.org/91304 | vdb-entry, x_refsource_OSVDB | |
http://www.openwall.com/lists/oss-security/2013/03/14/15 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/58490 | vdb-entry, x_refsource_BID | |
https://review.openstack.org/#/c/24439/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openstack-glance-api-info-disclosure(82878)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/24437/" }, { "name": "USN-1764-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1764-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/24438/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/glance/+bug/1135541" }, { "name": "52565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52565" }, { "name": "RHSA-2013:0707", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html" }, { "name": "91304", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/91304" }, { "name": "[oss-security] 20130314 [OSSA 2013-007] Backend credentials leak in Glance v1 API (CVE-2013-1840)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/14/15" }, { "name": "58490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58490" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.openstack.org/#/c/24439/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator\u0027s backend credentials via a request for a cached image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openstack-glance-api-info-disclosure(82878)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/24437/" }, { "name": "USN-1764-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1764-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/24438/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/glance/+bug/1135541" }, { "name": "52565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52565" }, { "name": "RHSA-2013:0707", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html" }, { "name": "91304", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/91304" }, { "name": "[oss-security] 20130314 [OSSA 2013-007] Backend credentials leak in Glance v1 API (CVE-2013-1840)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/14/15" }, { "name": "58490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/58490" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.openstack.org/#/c/24439/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1840", "datePublished": "2013-03-22T21:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7960
Vulnerability from cvelistv5
Published
2014-10-17 15:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2014/10/08/7 | mailing-list, x_refsource_MLIST | |
https://bugs.launchpad.net/swift/+bug/1365350 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2015-1495.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2015-0835.html | vendor-advisory, x_refsource_REDHAT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96901 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2014/10/07/39 | mailing-list, x_refsource_MLIST | |
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2704-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/70279 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2015-0836.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "name": "[oss-security] 20141008 Re: CVE request for vulnerability in OpenStack Swift", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "RHSA-2015:0835", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "name": "openstack-swift-cve20147960-sec-bypass(96901)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "name": "[oss-security] 20141007 CVE request for vulnerability in OpenStack Swift", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "USN-2704-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "name": "70279", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70279" }, { "name": "RHSA-2015:0836", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "name": "[oss-security] 20141008 Re: CVE request for vulnerability in OpenStack Swift", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "RHSA-2015:0835", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "name": "openstack-swift-cve20147960-sec-bypass(96901)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "name": "[oss-security] 20141007 CVE request for vulnerability in OpenStack Swift", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "USN-2704-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "name": "70279", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70279" }, { "name": "RHSA-2015:0836", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2015:1846", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "name": "[oss-security] 20141008 Re: CVE request for vulnerability in OpenStack Swift", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "name": "https://bugs.launchpad.net/swift/+bug/1365350", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "name": "RHSA-2015:1495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "RHSA-2015:0835", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "name": "openstack-swift-cve20147960-sec-bypass(96901)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "name": "[oss-security] 20141007 CVE request for vulnerability in OpenStack Swift", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "USN-2704-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "name": "70279", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70279" }, { "name": "RHSA-2015:0836", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7960", "datePublished": "2014-10-17T15:00:00", "dateReserved": "2014-10-07T00:00:00", "dateUpdated": "2024-08-06T13:03:27.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4155
Vulnerability from cvelistv5
Published
2013-08-20 22:00
Modified
2024-08-06 16:30
Severity ?
EPSS score ?
Summary
OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/swift/+bug/1196932 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2737 | vendor-advisory, x_refsource_DEBIAN | |
https://review.openstack.org/#/c/40646/ | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/08/07/6 | mailing-list, x_refsource_MLIST | |
http://www.ubuntu.com/usn/USN-2001-1 | vendor-advisory, x_refsource_UBUNTU | |
https://review.openstack.org/#/c/40645/ | x_refsource_MISC | |
https://review.openstack.org/#/c/40643/ | x_refsource_MISC | |
http://rhn.redhat.com/errata/RHSA-2013-1197.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1196932" }, { "name": "DSA-2737", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2737" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://review.openstack.org/#/c/40646/" }, { "name": "[oss-security] 20130807 [OSSA 2013-022] Swift Denial of Service using superfluous object tombstones (CVE-2013-4155)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/08/07/6" }, { "name": "USN-2001-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2001-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://review.openstack.org/#/c/40645/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://review.openstack.org/#/c/40643/" }, { "name": "RHSA-2013:1197", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1197.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service (\"superfluous\" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-12T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1196932" }, { "name": "DSA-2737", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2737" }, { "tags": [ "x_refsource_MISC" ], "url": "https://review.openstack.org/#/c/40646/" }, { "name": "[oss-security] 20130807 [OSSA 2013-022] Swift Denial of Service using superfluous object tombstones (CVE-2013-4155)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/08/07/6" }, { "name": "USN-2001-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2001-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://review.openstack.org/#/c/40645/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://review.openstack.org/#/c/40643/" }, { "name": "RHSA-2013:1197", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1197.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4155", "datePublished": "2013-08-20T22:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:30:50.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0738
Vulnerability from cvelistv5
Published
2016-01-29 20:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-0329.html | vendor-advisory, x_refsource_REDHAT | |
https://github.com/openstack/swift/blob/master/CHANGELOG | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/81432 | vdb-entry, x_refsource_BID | |
https://bugs.launchpad.net/cloud-archive/+bug/1493303 | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-0128.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html | vendor-advisory, x_refsource_FEDORA | |
http://rhn.redhat.com/errata/RHSA-2016-0155.html | vendor-advisory, x_refsource_REDHAT | |
https://security.openstack.org/ossa/OSSA-2016-004.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.348Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/openstack/swift/blob/master/CHANGELOG" }, { "name": "81432", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/81432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/cloud-archive/+bug/1493303" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "RHSA-2016:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "name": "FEDORA-2016-2256c80a94", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html" }, { "name": "RHSA-2016:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-02T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openstack/swift/blob/master/CHANGELOG" }, { "name": "81432", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/81432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/cloud-archive/+bug/1493303" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "RHSA-2016:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0128.html" }, { "name": "FEDORA-2016-2256c80a94", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html" }, { "name": "RHSA-2016:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0155.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.openstack.org/ossa/OSSA-2016-004.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0738", "datePublished": "2016-01-29T20:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.348Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16613
Vulnerability from cvelistv5
Published
2017-11-21 13:00
Modified
2024-08-05 20:27
Severity ?
EPSS score ?
Summary
An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101926 | vdb-entry, x_refsource_BID | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314 | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4044 | vendor-advisory, x_refsource_DEBIAN | |
https://bugs.launchpad.net/swift/+bug/1655781 | x_refsource_CONFIRM | |
https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "101926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101926" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314" }, { "name": "DSA-4044", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1655781" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "101926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101926" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314" }, { "name": "DSA-4044", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1655781" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16613", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "101926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101926" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882314" }, { "name": "DSA-4044", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4044" }, { "name": "https://bugs.launchpad.net/swift/+bug/1655781", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/swift/+bug/1655781" }, { "name": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298", "refsource": "CONFIRM", "url": "https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16613", "datePublished": "2017-11-21T13:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8761
Vulnerability from cvelistv5
Published
2021-06-02 13:45
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
References
▼ | URL | Tags |
---|---|---|
https://launchpad.net/bugs/1685798 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.net/bugs/1685798" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-02T13:45:46", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.net/bugs/1685798" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.net/bugs/1685798", "refsource": "MISC", "url": "https://launchpad.net/bugs/1685798" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8761", "datePublished": "2021-06-02T13:45:46", "dateReserved": "2017-05-03T00:00:00", "dateUpdated": "2024-08-05T16:48:22.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5223
Vulnerability from cvelistv5
Published
2015-10-26 17:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-0329.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html | vendor-advisory, x_refsource_SUSE | |
https://security.openstack.org/ossa/OSSA-2015-016.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2015-1895.html | vendor-advisory, x_refsource_REDHAT | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/84827 | vdb-entry, x_refsource_BID | |
https://bugs.launchpad.net/swift/+bug/1449212 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/08/26/5 | mailing-list, x_refsource_MLIST | |
https://bugs.launchpad.net/swift/+bug/1453948 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.openstack.org/ossa/OSSA-2015-016.html" }, { "name": "RHSA-2015:1895", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1895.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "84827", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/84827" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1449212" }, { "name": "[oss-security] 20150826 Subject: [OSSA 2015-016] Information leak via Swift tempurls (CVE-2015-5223)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/26/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/swift/+bug/1453948" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-26T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0329.html" }, { "name": "SUSE-SU-2015:1846", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.openstack.org/ossa/OSSA-2015-016.html" }, { "name": "RHSA-2015:1895", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1895.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "84827", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/84827" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1449212" }, { "name": "[oss-security] 20150826 Subject: [OSSA 2015-016] Information leak via Swift tempurls (CVE-2015-5223)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/26/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/swift/+bug/1453948" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5223", "datePublished": "2015-10-26T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6396
Vulnerability from cvelistv5
Published
2014-02-18 19:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/python-swiftclient/+bug/1199783 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/02/17/7 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/python-swiftclient/+bug/1199783" }, { "name": "[oss-security] 20140217 [OSSA 2014-005] Missing SSL certificate check in Python Swift client (CVE-2013-6396)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/17/7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-18T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/python-swiftclient/+bug/1199783" }, { "name": "[oss-security] 20140217 [OSSA 2014-005] Missing SSL certificate check in Python Swift client (CVE-2013-6396)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/17/7" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6396", "datePublished": "2014-02-18T19:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }