Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6428

Опубликовано: 11 дек. 2013
Источник: redhat
CVSS2: 4

Описание

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 3openstack-heatWill not fix
OpenStack 4 for RHEL 6openstack-heatFixedRHSA-2014:009022.01.2014

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1039144Heat: ReST API doesn't respect tenant scoping

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

nvd
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

debian
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013. ...

github
больше 3 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

4 Medium

CVSS2