Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3621

Опубликовано: 02 окт. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4

Описание

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

РелизСтатусПримечание
devel

released

1:2014.2~rc1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:2014.1.3-0ubuntu2.1]]
esm-infra/xenial

released

1:2014.2~rc1-0ubuntu1
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

1:2014.1.3-0ubuntu2.1
trusty/esm

DNE

trusty was released [1:2014.1.3-0ubuntu2.1]
upstream

released

2013.2.3, 2014.1.2.1
utopic

released

1:2014.2~rc1-0ubuntu1

Показывать по

4 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

nvd
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

debian
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 20 ...

github
больше 3 лет назад

OpenStack Identity Keystone Exposure of Sensitive Information

4 Medium

CVSS2