Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9599

Опубликовано: 22 дек. 2016
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 11 (Ocata)puppet-tripleoNot affected
Red Hat OpenStack Platform 10.0 (Newton)puppet-tripleoFixedRHSA-2017:002505.01.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1409687puppet-tripleo: if ssl is enabled, traffic is open on both undercloud and overcloud

EPSS

Процентиль: 40%
0.00179
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
почти 8 лет назад

puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.

CVSS3: 7.5
github
больше 3 лет назад

puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.

EPSS

Процентиль: 40%
0.00179
Низкий

7.1 High

CVSS3