CVE-2013-1793
https://notcve.org/view.php?id=CVE-2013-1793
openstack-utils openstack-db has insecure password creation openstack-db de openstack-utils, tiene una creación de contraseña no segura. • https://access.redhat.com/security/cve/cve-2013-1793 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793 • CWE-306: Missing Authentication for Critical Function •
CVE-2012-6120 – Puppet: Directory /var/log/puppet is world readable
https://notcve.org/view.php?id=CVE-2012-6120
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directory with world-readable permissions, which allows local users to obtain sensitive information such as Puppet log files. Red Hat OpenStack Essex y Folsom crea el directorio /var/log/puppet con permisos de lectura para todos, lo que permite a usuarios locales obtener información sensible, como los archivos de registro de Puppet. • http://rhn.redhat.com/errata/RHSA-2013-0710.html https://access.redhat.com/security/cve/CVE-2012-6120 https://bugzilla.redhat.com/show_bug.cgi?id=908629 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-1815 – packstack: answerfile creation permissions issue
https://notcve.org/view.php?id=CVE-2013-1815
PackStack 2012.2.3 in Red Hat OpenStack Essex and Folsom can create the answer file in insecure directories such as /tmp or the current working directory, which allows local users to modify deployed systems by changing this file. PackStack 03/02/2012 en Red Hat OpenStack Essex y Folsom se puede crear el archivo de respuesta en los directorios inseguros como /tmp o en el directorio de trabajo actual, que permite a usuarios locales modificar los sistemas desplegados cambiando de este archivo. • http://rhn.redhat.com/errata/RHSA-2013-0671.html https://bugzilla.redhat.com/show_bug.cgi?id=917904 https://exchange.xforce.ibmcloud.com/vulnerabilities/83017 https://access.redhat.com/security/cve/CVE-2013-1815 • CWE-255: Credentials Management Errors •