Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6428

Опубликовано: 14 дек. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4

Описание

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

РелизСтатусПримечание
devel

not-affected

2014.1~rc1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [2014.1~rc1-0ubuntu1]]
lucid

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

ignored

end of life
trusty

not-affected

2014.1~rc1-0ubuntu1
trusty/esm

DNE

trusty was not-affected [2014.1~rc1-0ubuntu1]
upstream

released

2014.1.rc1

Показывать по

EPSS

Процентиль: 39%
0.0017
Низкий

4 Medium

CVSS2

Связанные уязвимости

redhat
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

nvd
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

debian
около 12 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013. ...

github
больше 3 лет назад

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.

EPSS

Процентиль: 39%
0.0017
Низкий

4 Medium

CVSS2