CVE-2015-5250 – OpenShift: Malformed JSON can cause API process crash
https://notcve.org/view.php?id=CVE-2015-5250
The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data. Vulnerabilidad en el servidor API en OpenShift Origin 1.0.5, permite a atacantes remotos causar una denegación de servicio (caída del proceso maestro) a través de datos JSON manipulados. It was found that improper error handling in the API server could cause the master process to crash. A user with network access to the master could use this flaw to crash the master process. • https://access.redhat.com/errata/RHSA-2015:1736 https://bugzilla.redhat.com/show_bug.cgi?id=1259867 https://github.com/openshift/origin/issues/4374 https://access.redhat.com/security/cve/CVE-2015-5250 • CWE-20: Improper Input Validation •
CVE-2014-3496 – Origin: Command execution as root via downloadable cartridge source-url
https://notcve.org/view.php?id=CVE-2014-3496
cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file. cartridge_repository.rb en OpenShift Origin and Enterprise 1.2.8 hasta 2.1.1 permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres de shell en una Url de fuente que termina con una extensión de fichero (1) .tar.gz, (2) .zip, (3) .tgz o (4) .tar en un fichero del manifiesto de cartuchos. • http://rhn.redhat.com/errata/RHSA-2014-0762.html http://rhn.redhat.com/errata/RHSA-2014-0763.html http://rhn.redhat.com/errata/RHSA-2014-0764.html http://secunia.com/advisories/59298 https://bugzilla.redhat.com/show_bug.cgi?id=1110470 https://github.com/openshift/origin-server/pull/5521 https://access.redhat.com/security/cve/CVE-2014-3496 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2013-0164 – openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation
https://notcve.org/view.php?id=CVE-2013-0164
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. La función "lockwrap" en port-proxy/bin/openshift-port-proxy-cfg en Red Hat OpenShift Origin anterior a v1.1 permite a usuarios locales sobrescribir archivos arbitrarios mediante un ataque de enlaces simbólicos en un archivo temporal con un nombre predecible en /tmp. • http://rhn.redhat.com/errata/RHSA-2013-0220.html https://bugzilla.redhat.com/show_bug.cgi?id=893307 https://github.com/openshift/origin-server/commit/524465f70a32d0eb6bf047e6a05c76c22d52bfa2 https://github.com/openshift/origin-server/pull/1136 https://access.redhat.com/security/cve/CVE-2013-0164 • CWE-264: Permissions, Privileges, and Access Controls CWE-377: Insecure Temporary File •
CVE-2012-5658 – Origin: rhc-chk.rb password exposure in log files
https://notcve.org/view.php?id=CVE-2012-5658
rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels. RHC-chk.rb en Red Hat OpenShift Origin anterior a v1,1, cuando -d (modo de depuración) se utiliza, muestra la contraseña y otra información confidencial en texto plano, lo que permite a atacantes dependientes del contexto obtener información sensible, como se ha demostrado mediante la inclusión de archivos de registro o reportes de Bugzilla en los canales de ayuda. • http://rhn.redhat.com/errata/RHSA-2013-0220.html https://bugzilla.redhat.com/show_bug.cgi?id=889062 https://access.redhat.com/security/cve/CVE-2012-5658 • CWE-310: Cryptographic Issues •
CVE-2012-5647 – openshift-origin-node-util: restorer.php arbitrary URL redirection
https://notcve.org/view.php?id=CVE-2012-5647
Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO. Vulnerabilidad de redirección en node-util/www/html/restorer.php en Red Hat OpenShift Origin anterior a v1.0.5-3 permite a atacantes remotos redirigir usuarios a sitios Web Arbitrarios y llevar a cabo ataques de phishing mediante una URL en el PATH_INFO. • http://rhn.redhat.com/errata/RHSA-2013-0148.html http://www.osvdb.org/89430 http://www.securityfocus.com/bid/57189 https://bugzilla.redhat.com/show_bug.cgi?id=888523 https://github.com/openshift/origin-server/commit/32564a0839b1517d762afab2013c26c0959bac00 https://github.com/openshift/origin-server/pull/1017 https://access.redhat.com/security/cve/CVE-2012-5647 • CWE-20: Improper Input Validation •