Filtered by vendor Openstack
Subscribe
Total
253 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-0326 | 2 Debian, Openstack | 2 Debian Linux, Nova | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
OpenStack nova base images permissions are world readable | |||||
CVE-2012-5474 | 4 Debian, Fedoraproject, Openstack and 1 more | 4 Debian Linux, Fedora, Horizon and 1 more | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
The file /etc/openstack-dashboard/local_settings within Red Hat OpenStack Platform 2.0 and RHOS Essex Release (python-django-horizon package before 2012.1.1) is world readable and exposes the secret key value. | |||||
CVE-2015-9543 | 1 Openstack | 1 Nova | 2023-12-10 | 2.1 LOW | 3.3 LOW |
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py. | |||||
CVE-2013-2166 | 4 Debian, Fedoraproject, Openstack and 1 more | 4 Debian Linux, Fedora, Python-keystoneclient and 1 more | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass | |||||
CVE-2013-2255 | 3 Debian, Openstack, Redhat | 4 Debian Linux, Compute, Keystone and 1 more | 2023-12-10 | 4.3 MEDIUM | 5.9 MEDIUM |
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. | |||||
CVE-2019-19687 | 1 Openstack | 1 Keystone | 2023-12-10 | 3.5 LOW | 8.8 HIGH |
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.) | |||||
CVE-2013-2167 | 3 Debian, Openstack, Redhat | 3 Debian Linux, Python-keystoneclient, Openstack | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | |||||
CVE-2012-1572 | 2 Debian, Openstack | 2 Debian Linux, Keystone | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space | |||||
CVE-2012-5476 | 2 Debian, Openstack | 2 Debian Linux, Horizon | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value. | |||||
CVE-2019-14433 | 4 Canonical, Debian, Openstack and 1 more | 4 Ubuntu Linux, Debian Linux, Nova and 1 more | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. | |||||
CVE-2016-7404 | 1 Openstack | 1 Magnum | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform. | |||||
CVE-2019-9735 | 3 Debian, Openstack, Redhat | 3 Debian Linux, Neutron, Openstack | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) | |||||
CVE-2019-3830 | 2 Openstack, Redhat | 2 Ceilometer, Openstack | 2023-12-10 | 2.1 LOW | 7.8 HIGH |
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated. | |||||
CVE-2019-15753 | 1 Openstack | 1 Os-vif | 2023-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
In OpenStack os-vif 1.15.x before 1.15.2, and 1.16.0, a hard-coded MAC aging time of 0 disables MAC learning in linuxbridge, forcing obligatory Ethernet flooding of non-local destinations, which both impedes network performance and allows users to possibly view the content of packets for instances belonging to other tenants sharing the same network. Only deployments using the linuxbridge backend are affected. This occurs in PyRoute2.add() in internal/command/ip/linux/impl_pyroute2.py. | |||||
CVE-2019-3895 | 2 Openstack, Redhat | 2 Octavia, Openstack | 2023-12-10 | 6.8 MEDIUM | 8.0 HIGH |
An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. | |||||
CVE-2011-3147 | 1 Openstack | 1 Nova | 2023-12-10 | 5.0 MEDIUM | 8.6 HIGH |
Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem. | |||||
CVE-2019-10141 | 2 Openstack, Redhat | 3 Ironic-inspector, Enterprise Linux, Openstack | 2023-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector's node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service. | |||||
CVE-2019-10876 | 2 Openstack, Redhat | 2 Neutron, Openstack | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected. | |||||
CVE-2018-16856 | 2 Openstack, Redhat | 2 Octavia, Openstack | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
In a default Red Hat Openstack Platform Director installation, openstack-octavia before versions openstack-octavia 2.0.2-5 and openstack-octavia-3.0.1-0.20181009115732 creates log files that are readable by all users. Sensitive information such as private keys can appear in these log files allowing for information exposure. | |||||
CVE-2018-10898 | 2 Openstack, Redhat | 2 Tripleo Heat Templates, Openstack | 2023-12-10 | 5.8 MEDIUM | 8.8 HIGH |
A vulnerability was found in openstack-tripleo-heat-templates before version 8.0.2-40. When deployed using Director using default configuration, Opendaylight in RHOSP13 is configured with easily guessable default credentials. |