Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6428

Опубликовано: 14 дек. 2013
Источник: debian
EPSS Низкий

Описание

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
heatfixed2013.2.1-1package

Примечания

  • https://launchpad.net/bugs/1256983

EPSS

Процентиль: 38%
0.0017
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

redhat
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

nvd
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

github
больше 3 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

EPSS

Процентиль: 38%
0.0017
Низкий