Redhat

Openstack

211 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.43%
  • Veröffentlicht 02.10.2014 14:55:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the pub...

  • EPSS 0.75%
  • Veröffentlicht 19.08.2014 18:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The notifier middleware in OpenStack PyCADF 0.5.0 and earlier, Telemetry (Ceilometer) 2013.2 before 2013.2.4 and 2014.x before 2014.1.2, Neutron 2014.x before 2014.1.2 and Juno before Juno-2, and Oslo allows remote authenticated users to obtain X_AUT...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, uses an HTTP connection to download (1) packages and (2) signing keys from Yum repositories, which allows man-in-the-middle attackers to prevent up...

  • EPSS 0.36%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, sets sslverify to false for certain Yum repositories, which disables SSL protection and allows man-in-the-middle attackers to prevent updates via u...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, sets gpgcheck to 0 for certain templates, which disables GPG signature checking on downloaded packages and allows man-in-the-middle attackers to in...

  • EPSS 0.28%
  • Veröffentlicht 02.06.2014 15:55:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default configuration in the standalone controller quickstack manifest in openstack-foreman-installer, as used in Red Hat Enterprise Linux OpenStack Platform 4.0, disables authentication for Qpid, which allows remote attackers to gain access by c...

  • EPSS 0.19%
  • Veröffentlicht 17.04.2014 14:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

  • EPSS 8.06%
  • Veröffentlicht 06.02.2014 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML docum...

  • EPSS 0.39%
  • Veröffentlicht 02.02.2014 00:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

Exploit
  • EPSS 0.5%
  • Veröffentlicht 14.12.2013 17:21:46
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from ...