2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-7945" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2017-08-18T17:29:01.327" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T02:37:43.037" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2 allows remote attackers to obtain the DRBD secret via instance information job results."
} ,
{
"lang" : "es" ,
"value" : "La interfaz de control RESTful (tambi\u00e9n conocida como RAPI o ganeti-rapi) en Ganeti en versiones anteriores a la 2.9.7, 2.10.x en versiones anteriores a la 2.10.8, 2.11.x en versiones anteriores a la 2.11.8, 2.12.x en versiones anteriores a la 2.12.6, 2.13.x en versiones anteriores a la 2.13.3, 2.14.x en versiones anteriores a la 2.14.2, y 2.15.x en versiones anteriores a la 2.15.2 permite que atacantes remotos obtengan el secreto DRBD mediante resultados de trabajo de informaci\u00f3n de instancia."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : true ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.9.6" ,
"matchCriteriaId" : "2AFB2A29-9615-40BE-A9D2-5ED10CAD25F5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F66B137A-661B-4A33-B42D-36086C5CE25F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD3870AD-723B-4EE6-B86F-759126E06F21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A8CBB01-AA66-4262-A3DF-26DED8E1B243"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4F6F8F9E-2942-45A9-A3DF-7A2B3392110C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4946A0E-7FAF-49D1-85B7-5CE8A31B9F3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C0A6331-D11E-4062-8883-3B0A8661CE20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74F1C8B8-9A50-45E5-8CCA-425199DEB994"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1136452D-0A89-4E27-B6FA-F08236885FFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22D6DAB2-3455-4532-8FC9-FB04DD71B9B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F038EE62-9261-4D28-BC3C-8692FCA87115"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35ECC2AA-C63F-4794-A62D-B78ED6F82DD5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.10.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27853A40-4920-4EAD-B7D7-94F21984F0F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "773D755E-7E1E-460E-A753-9AB5AA67759E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B85FCE9-38B9-437D-AA42-A5C258A1D785"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "4806E38C-C58B-4C41-A2BB-D6ABB2A392C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB162407-8069-43A6-8F93-492E6EBF17C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "997067C6-82FC-4917-A16C-3E8D7F1DFC77"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "15071497-2E59-4EA1-ACDC-5D6AC2703226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FA19307-8A03-4161-9A15-BA8C7FD83F3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9A1261E-DC4D-49DA-9667-738D7B50C4AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53A21A0F-1087-4C50-A9BE-1401C6D2E353"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.11.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AC8EDA6-66FA-4B10-93BD-75DBB1936890"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF9320F7-7814-4C8D-8B0D-E3C561F241AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA3195D4-3F38-4233-93BD-9C7B0BD81DEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E1CA193-AB44-4FE1-89EB-F44B4BAE5E8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "52293A00-F1A4-4855-B9D3-231CC3F44F14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A613785D-35E9-4D04-AA53-ECE74D19416D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DA3E104-B4F1-4D1F-96EC-3920AA3D947B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "94BE58DA-8FEB-469A-9357-336EEA5E4C69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4814E6BD-E537-4ED5-9E2D-C6C93967B481"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.12.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E7081B6-E36F-460D-BD6A-A58190046671"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91E4AA14-555D-46F1-BFC6-1E7DC241B146"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.13.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "79DF3293-D53E-4BA0-AB1D-1F60DDEE4657"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.13.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "43DC4920-7456-40C3-8DB3-0131FA8B1E62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.13.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26181A20-ACF6-4EB4-869D-6B26B7C41783"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.13.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF9B2609-E1A3-4835-9F10-A36D377597F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9ED4BD26-FCF7-4D80-A303-A265C8C0E5C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F1246E6-E244-4F8A-AB57-2463BDD83549"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "3009D3B0-1890-4F9D-8B43-29CD245EBCCE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CEB2AE3B-D220-40CA-8945-0D8B17152D39"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "913E97F4-4D88-445D-B0D4-6915F0744793"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.14.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "344982DF-20A4-4DB7-A3B7-ACC8A0BEAE32"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.15.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B36F975B-6F6A-43AE-9588-A844A340C0F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.15.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2F9BF24-60B1-4334-9082-8F1F251B381A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.15.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1A19969-A0E2-4FFB-A4AC-AC330F3C89F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:spi-inc:ganeti:2.15.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "480C9B88-DC61-4586-B714-69751FC233C5"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.debian.org/security/2016/dsa-3431" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.ocert.org/advisories/ocert-2015-012.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/39169/" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.debian.org/security/2016/dsa-3431" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.ocert.org/advisories/ocert-2015-012.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/39169/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}