6.5
CVSSv2

CVE-2015-1195

Published: 21/01/2015 Updated: 04/02/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The V2 API in OpenStack Image Registry and Delivery Service (Glance) prior to 2014.1.4 and 2014.2.x prior to 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a filesystem: URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.

Vulnerable Product Search on Vulmon Subscribe to Product

openstack image registry and delivery service \\(glance\\)

Vendor Advisories

Debian Bug report logs - #775926 CVE-2015-1195: Glance still allows users to download and delete any file in glance-api server Package: glance; Maintainer for glance is Debian OpenStack <team+openstack@trackerdebianorg>; Source for glance is src:glance (PTS, buildd, popcon) Reported by: Thomas Goirand <zigo@debianorg&g ...
It was discovered that the fix for CVE-2014-9493 was incomplete: an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user Note that only setups using the OpenStack Image V2 API were affected by this flaw ...