OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1525.html | vendor-advisory x_refsource_REDHAT |
http://www.ubuntu.com/usn/USN-2003-1 | vendor-advisory x_refsource_UBUNTU |
https://launchpad.net/glance/+milestone/2013.1.4 | x_refsource_CONFIRM |
https://bugs.launchpad.net/glance/+bug/1235378 | x_refsource_CONFIRM |
http://www.openwall.com/lists/oss-security/2013/10/15/8 | mailing-list x_refsource_MLIST |
http://www.securityfocus.com/bid/63159 | vdb-entry x_refsource_BID |
http://www.openwall.com/lists/oss-security/2013/10/16/9 | mailing-list x_refsource_MLIST |
https://bugs.launchpad.net/glance/+bug/1235226 | x_refsource_CONFIRM |
https://launchpad.net/glance/+milestone/2013.2 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1525.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.ubuntu.com/usn/USN-2003-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
https://launchpad.net/glance/+milestone/2013.1.4 | x_refsource_CONFIRM x_transferred |
https://bugs.launchpad.net/glance/+bug/1235378 | x_refsource_CONFIRM x_transferred |
http://www.openwall.com/lists/oss-security/2013/10/15/8 | mailing-list x_refsource_MLIST x_transferred |
http://www.securityfocus.com/bid/63159 | vdb-entry x_refsource_BID x_transferred |
http://www.openwall.com/lists/oss-security/2013/10/16/9 | mailing-list x_refsource_MLIST x_transferred |
https://bugs.launchpad.net/glance/+bug/1235226 | x_refsource_CONFIRM x_transferred |
https://launchpad.net/glance/+milestone/2013.2 | x_refsource_CONFIRM x_transferred |
OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 3.5 | LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
Hyperlink | Source | Resource |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1525.html | secalert@redhat.com | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/15/8 | secalert@redhat.com | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/16/9 | secalert@redhat.com | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/63159 | secalert@redhat.com | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2003-1 | secalert@redhat.com | Third Party Advisory |
https://bugs.launchpad.net/glance/+bug/1235226 | secalert@redhat.com | Exploit Third Party Advisory |
https://bugs.launchpad.net/glance/+bug/1235378 | secalert@redhat.com | Exploit Third Party Advisory |
https://launchpad.net/glance/+milestone/2013.1.4 | secalert@redhat.com | Patch Third Party Advisory |
https://launchpad.net/glance/+milestone/2013.2 | secalert@redhat.com | Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1525.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/15/8 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/16/9 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/63159 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2003-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://bugs.launchpad.net/glance/+bug/1235226 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Third Party Advisory |
https://bugs.launchpad.net/glance/+bug/1235378 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Third Party Advisory |
https://launchpad.net/glance/+milestone/2013.1.4 | af854a3a-2127-422b-91ae-364da2661108 | Patch Third Party Advisory |
https://launchpad.net/glance/+milestone/2013.2 | af854a3a-2127-422b-91ae-364da2661108 | Patch Third Party Advisory |