Redhat

Openstack

212 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Veröffentlicht 08.10.2014 19:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The strutils.mask_password function in the OpenStack Oslo utility library, Cinder, Nova, and Trove before 2013.2.4 and 2014.1 before 2014.1.3 does not properly mask passwords when logging commands, which allows local users to obtain passwords by read...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 02.10.2014 14:55:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the pub...

  • EPSS 0.75%
  • Veröffentlicht 19.08.2014 18:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The notifier middleware in OpenStack PyCADF 0.5.0 and earlier, Telemetry (Ceilometer) 2013.2 before 2013.2.4 and 2014.x before 2014.1.2, Neutron 2014.x before 2014.1.2 and Juno before Juno-2, and Oslo allows remote authenticated users to obtain X_AUT...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, uses an HTTP connection to download (1) packages and (2) signing keys from Yum repositories, which allows man-in-the-middle attackers to prevent up...

  • EPSS 0.26%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, sets sslverify to false for certain Yum repositories, which disables SSL protection and allows man-in-the-middle attackers to prevent updates via u...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 02.06.2014 15:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, sets gpgcheck to 0 for certain templates, which disables GPG signature checking on downloaded packages and allows man-in-the-middle attackers to in...

  • EPSS 0.28%
  • Veröffentlicht 02.06.2014 15:55:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default configuration in the standalone controller quickstack manifest in openstack-foreman-installer, as used in Red Hat Enterprise Linux OpenStack Platform 4.0, disables authentication for Qpid, which allows remote attackers to gain access by c...

  • EPSS 0.19%
  • Veröffentlicht 17.04.2014 14:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

  • EPSS 8.06%
  • Veröffentlicht 06.02.2014 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML docum...

  • EPSS 0.39%
  • Veröffentlicht 02.02.2014 00:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.