Описание
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
Отчет
The Red Hat Security Response Team has rated this issue as having moderate security impact in OpenStack Essex (1.0) and Openstack Folsom (2.1). A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenStack Platform 2.1 | openstack-swift | Will not fix | ||
| Red Hat Storage 2.0 | gluster-swift | Affected | ||
| Red Hat Storage 2.1 | gluster-swift | Affected | ||
| RHOS Essex Release | openstack-swift | Will not fix | ||
| OpenStack 3 for RHEL 6 | openstack-swift | Fixed | RHSA-2013:0993 | 27.06.2013 |
Показывать по
Дополнительная информация
Статус:
5.8 Medium
CVSS2
Связанные уязвимости
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
XML injection vulnerability in account/utils.py in OpenStack Swift Fol ...
5.8 Medium
CVSS2