4 results (0.015 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image. OpenStack Image Service (Glance) en versiones anteriores a 2015.1.3 (kilo) y 11.0.x en versiones anteriores a 11.0.2 (liberty), cuando show_multiple_locations está habilitado, permiten a usuarios remotos autenticados cambiar el estado de imagen y cargar nuevos datos de imagen eliminando la última localización de una imagen. An authorization vulnerability in OpenStack Image service was discovered, which allowed image-status manipulation using locations. By removing the last location of an image, an authenticated user could change the status from 'active' to 'queue'. A malicious tenant could exploit this flaw to silently replace owned image data, regardless of its original creator or visibility settings. • http://rhn.redhat.com/errata/RHSA-2016-0309.html http://www.securityfocus.com/bid/82696 https://security.openstack.org/ossa/OSSA-2016-006.html https://access.redhat.com/security/cve/CVE-2016-0757 https://bugzilla.redhat.com/show_bug.cgi?id=1302607 • CWE-284: Improper Access Control CWE-285: Improper Authorization •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a filesystem: URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493. La API V2 en OpenStack Image Registry and Delivery Service (Glance) anterior a 2014.1.4 y 2014.2.x anterior a 2014.2.2 permite a usuarios remotos autenticados leer o eliminar ficheros arbitrarios a través de un nombre de ruta completo en una URL filesystem: en la propiedad de la localización de imágenes. NOTA: esta vulnerabilidad existe debida a una soluciona incompleta para CVE-2014-9493. • http://lists.openstack.org/pipermail/openstack-announce/2015-January/000325.html http://secunia.com/advisories/62169 http://www.openwall.com/lists/oss-security/2015/01/15/2 http://www.openwall.com/lists/oss-security/2015/01/18/5 http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html http://www.securityfocus.com/bid/71976 https://bugs.launchpad.net/ossa/+bug/1408663 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property. La API V2 en OpenStack Image Registry and Delivery Service (Glance) anterior a 2014.2.2 y 2014.1.4 permite a usuarios remotos autenticados leer o eliminar ficheros a través de un nombre de ruta completo en un fichero: URL en la propiedad de la localización de imágenes. It was discovered that an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user. Note that only setups using the OpenStack Image V2 API were affected by this flaw. • http://lists.openstack.org/pipermail/openstack-announce/2014-December/000317.html http://rhn.redhat.com/errata/RHSA-2015-0246.html http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html http://www.securityfocus.com/bid/71688 https://bugs.launchpad.net/glance/+bug/1400966 https://security.openstack.org/ossa/OSSA-2014-041.html https://access.redhat.com/security/cve/CVE-2014-9493 https://bugzilla.redhat.com/show_bug.cgi?id=1174474 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 0%CPEs: 10EXPL: 0

OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image. OpenStack Image Registry and Delivery Service (Glance) anterior a 2013.2.4, 2014.x anterior a 2014.1.3, y Juno anterior a Juno-3, cuando utiliza la API V2, no aplica debidamente la opción de configuración image_size_cap, lo que permite a usuarios remotos autenticados causar una denegación de servicio (el consumo del disco) mediante la subida de un imagen grande. It was discovered that the image_size_cap configuration option in glance was not honored. An authenticated user could use this flaw to upload an image to glance and consume all available storage space, resulting in a denial of service. • http://rhn.redhat.com/errata/RHSA-2014-1337.html http://rhn.redhat.com/errata/RHSA-2014-1338.html http://rhn.redhat.com/errata/RHSA-2014-1685.html http://secunia.com/advisories/60743 http://www.openwall.com/lists/oss-security/2014/08/21/6 http://www.ubuntu.com/usn/USN-2322-1 https://bugs.launchpad.net/glance/+bug/1315321 https://access.redhat.com/security/cve/CVE-2014-5356 https://bugzilla.redhat.com/show_bug.cgi?id=1131770 • CWE-264: Permissions, Privileges, and Access Controls CWE-400: Uncontrolled Resource Consumption •