The gather log service in Eucalyptus prior to 3.3.1 allows remote malicious users to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
eucalyptus eucalyptus 1.6 |
||
eucalyptus eucalyptus 1.6.2 |
||
eucalyptus eucalyptus 2.0 |
||
eucalyptus eucalyptus 2.0.0 |
||
eucalyptus eucalyptus 1.0 |
||
eucalyptus eucalyptus 1.1 |
||
eucalyptus eucalyptus 1.2 |
||
eucalyptus eucalyptus 3.0.1 |
||
eucalyptus eucalyptus 3.1.0 |
||
eucalyptus eucalyptus 3.1.1 |
||
eucalyptus eucalyptus 3.1.2 |
||
eucalyptus eucalyptus 3.2.0 |
||
eucalyptus eucalyptus 1.4 |
||
eucalyptus eucalyptus 1.5.2 |
||
eucalyptus eucalyptus 2.0.1 |
||
eucalyptus eucalyptus 2.0.3 |
||
eucalyptus eucalyptus 3.2.1 |
||
eucalyptus eucalyptus |
||
eucalyptus eucalyptus 1.3 |
||
eucalyptus eucalyptus 1.5.1 |
||
eucalyptus eucalyptus 2.0.2 |
||
eucalyptus eucalyptus 3.0 |
||
eucalyptus eucalyptus 3.2.2 |