First published: Tue Dec 18 2012(Updated: )
Michael Scherer (mscherer) reports: the file <a href="https://github.com/openshift/origin-server/blob/master/node-util/www/html/restorer.php">https://github.com/openshift/origin-server/blob/master/node-util/www/html/restorer.php</a> used to restore application after being idle fails to safely handle user supplied data that is later used in the HTTP headers for the Location: value which can then result in request redirection to an arbitrary page.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =1.0 | |
Red Hat OpenShift Origin | <=1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5647 has a medium severity rating due to its potential to compromise application integrity.
To fix CVE-2012-5647, upgrade to the latest patched version of Red Hat OpenShift or OpenShift Origin.
CVE-2012-5647 affects Red Hat OpenShift 1.0 and Red Hat OpenShift Origin up to version 1.0.5.
CVE-2012-5647 addresses a vulnerability in the restoration process of applications after being idle.
Currently, the recommended solution for CVE-2012-5647 is to upgrade the affected software as no workaround is advised.