1 results (0.001 seconds)

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command. OpenStack Cinder anterior a 2014.1.5 (icehouse), 2014.2.x anterior a 2014.2.4 (juno), y 2015.1.x anterior a 2015.1.1 (kilo) permite a usuarios remotos autenticados leer ficheros arbitrarios a través de una firma qcow2 manipulada en una imagen en el comando 'subir a imagen' (upload-to-image). A flaw was found in the OpenStack Block Storage (cinder) upload-to-image functionality. When processing a malicious qcow2 header, cinder could be tricked into reading an arbitrary file from the cinder host. • http://lists.openstack.org/pipermail/openstack-announce/2015-June/000367.html http://rhn.redhat.com/errata/RHSA-2015-1206.html http://www.debian.org/security/2015/dsa-3292 http://www.openwall.com/lists/oss-security/2015/06/13/1 http://www.openwall.com/lists/oss-security/2015/06/17/2 http://www.openwall.com/lists/oss-security/2015/06/17/7 http://www.ubuntu.com/usn/USN-2703-1 https://bugs.launchpad.net/cinder/+bug/1415087 https://access.redhat.com/sec • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •