3 results (0.065 seconds)

CVSS: 9.1EPSS: 0%CPEs: 10EXPL: 0

A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector's node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. • https://access.redhat.com/errata/RHSA-2019:2505 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10141 https://docs.openstack.org/releasenotes/ironic-inspector/ocata.html#relnotes-5-0-2-7-origin-stable-ocata https://docs.openstack.org/releasenotes/ironic-inspector/pike.html#relnotes-6-0-3-4-stable-pike https://docs.openstack.org/releasenotes/ironic-inspector/queens.html#relnotes-7-2-4-stable-queens https://docs.openstack.org/releasenotes/ironic-inspector/rocky.html#relnotes-8-0-3-stable-rocky • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

OpenStack Ironic 4.2.0 through 4.2.1 does not "clean" the disk after use, which allows remote authenticated users to obtain sensitive information. OpenStack Ironic versión 4.2.0 hasta la 4.2.1 no "limpia" el disco después del uso, lo que permite a los usuarios autenticados remotos obtener información confidencial. • http://www.openwall.com/lists/oss-security/2015/12/03/4 https://bugzilla.redhat.com/show_bug.cgi?id=1285809 https://review.openstack.org/#/c/252993 https://review.openstack.org/#/c/253001 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. OpenStack Ironic Inspector (también conocido como ironic-inspector o ironic-discoverd), cuando el modo depurardor está habilitado, podría permitir a atacantes remotos acceder a la consola Flask y ejecutar código Python arbitrario desencadenando un error. It was discovered that enabling debug mode in openstack-ironic-discoverd also enabled debug mode in the underlying Flask framework. If errors were encountered while Flask was in debug mode, a user experiencing an error might be able to access the debug console (effectively, a command shell). • http://rhn.redhat.com/errata/RHSA-2015-2685.html https://access.redhat.com/errata/RHSA-2015:1929 https://bugs.launchpad.net/ironic-inspector/+bug/1506419 https://bugzilla.redhat.com/show_bug.cgi?id=1273698 https://access.redhat.com/security/cve/CVE-2015-5306 • CWE-254: 7PK - Security Features CWE-749: Exposed Dangerous Method or Function •