René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.0 KiB
JSON

{
"id": "CVE-2015-5271",
"sourceIdentifier": "secalert@redhat.com",
"published": "2016-04-15T17:59:00.193",
"lastModified": "2023-02-13T00:52:37.550",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The TripleO Heat templates (tripleo-heat-templates) do not properly order the Identity Service (keystone) before the OpenStack Object Storage (Swift) staticweb middleware in the swiftproxy pipeline when the staticweb middleware is enabled, which might allow remote attackers to obtain sensitive information from private containers via unspecified vectors."
},
{
"lang": "es",
"value": "Las plantillas TripleO Heat (tripleo-heat-templates) no ordena correctamente el Identity Service (keystone) en versiones anteriores al middleware de web est\u00e1tica OpenStack Object Storage (Swift) en el pipeline de swiftproxy cuando el middleware de web est\u00e1tica est\u00e1 habilitado, lo que podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible de contenedores privados a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DAA72A4-AC7D-4544-89D4-5B07961D5A95"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openstack:tripleo_heat_templates:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB6AF34-5670-47C2-85A4-1C3E0D6AE890"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2015:1862",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugs.launchpad.net/tripleo/+bug/1494896",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261697",
"source": "secalert@redhat.com"
},
{
"url": "https://launchpadlibrarian.net/217268516/CVE-2015-5271_puppet-swift.patch",
"source": "secalert@redhat.com"
}
]
}