Openstack

Heat

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.37%
  • Published 02.08.2024 21:16:31
  • Last modified 07.10.2024 19:15:11

An incomplete fix for CVE-2023-1625 was found in openstack-heat. Sensitive information may possibly be disclosed through the OpenStack stack abandon command with the hidden feature set to True and the CVE-2023-1625 fix applied.

Exploit
  • EPSS 0.12%
  • Published 24.09.2023 01:15:43
  • Last modified 21.11.2024 07:39:34

An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, inte...

  • EPSS 0.07%
  • Published 27.07.2018 18:29:00
  • Last modified 21.11.2024 03:23:51

An access-control flaw was found in the OpenStack Orchestration (heat) service before 8.0.0, 6.1.0 and 7.0.2 where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive informa...

  • EPSS 0.34%
  • Published 04.11.2016 10:59:05
  • Last modified 12.04.2025 10:46:40

In OpenStack Heat, by launching a new Heat stack with a local URL an authenticated user may conduct network discovery revealing internal network configuration. Affected versions are <=5.0.3, >=6.0.0 <=6.1.0, and ==7.0.0.

  • EPSS 0.43%
  • Published 23.05.2014 14:55:11
  • Last modified 12.04.2025 10:46:40

OpenStack Orchestration API (Heat) 2013.2 through 2013.2.3 and 2014.1, when creating the stack for a template using a provider template, allows remote authenticated users to obtain the provider template URL via the resource-type-list.

Exploit
  • EPSS 0.33%
  • Published 14.12.2013 17:21:47
  • Last modified 11.04.2025 00:51:21

The cloudformation-compatible API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 does not properly enforce policy rules, which allows local in-instance users to bypass intended access restrictions and (1) ...

Exploit
  • EPSS 0.17%
  • Published 14.12.2013 17:21:47
  • Last modified 11.04.2025 00:51:21

The ReST API in OpenStack Orchestration API (Heat) before Havana 2013.2.1 and Icehouse before icehouse-2 allows remote authenticated users to bypass the tenant scoping restrictions via a modified tenant_id in the request path.