CVE-2015-6861

HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eucalyptus:eucalyptus:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:eucalyptus:eucalyptus:4.2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-01-05 11:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-6861

Mitre link : CVE-2015-6861

CVE.ORG link : CVE-2015-6861


JSON object : View

Products Affected

eucalyptus

  • eucalyptus
CWE
CWE-264

Permissions, Privileges, and Access Controls