5.5
CVSSv2

CVE-2014-9493

Published: 07/01/2015 Updated: 01/02/2019
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Vulnerability Summary

The V2 API in OpenStack Image Registry and Delivery Service (Glance) prior to 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat openstack 5.0

redhat openstack 4.0

openstack image registry and delivery service \\(glance\\)

Vendor Advisories

Synopsis Important: openstack-glance security update Type/Severity Security Advisory: Important Topic Updated openstack-glance packages that fix one security issue are nowavailable for Red Hat Enterprise Linux OpenStack Platform 40 and Red HatEnterprise Linux OpenStack Platform 50 for Red Hat Enterprise L ...
Debian Bug report logs - #773836 glance: CVE-2014-9493: unrestricted path traversal flaw Package: src:glance; Maintainer for src:glance is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 23 Dec 2014 20:48:18 UTC Severity: serious Tags: security, u ...
It was discovered that an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user Note that only setups using the OpenStack Image V2 API were affected by this flaw ...