First published: Wed Feb 21 2018(Updated: )
The Privileges portion of the web GUI and the XMLRPC API in Apache VCL 2.3.x before 2.3.2, 2.2.x before 2.2.2 and 2.1 allow remote authenticated users with nodeAdmin, manageGroup, resourceGrant, or userGrant permissions to gain privileges, cause a denial of service, or conduct cross-site scripting (XSS) attacks by leveraging improper data validation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Virtual Computing Lab | >=2.2<=2.2.2 | |
Apache Virtual Computing Lab | >=2.3<2.3.2 | |
Apache Virtual Computing Lab | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0267 has a moderate severity, allowing authenticated users to gain unauthorized privileges.
To fix CVE-2013-0267, upgrade Apache VCL to version 2.3.2 or higher, or 2.2.2 or higher.
CVE-2013-0267 can facilitate privilege escalation, denial of service, and cross-site scripting attacks.
Authenticated users with specific roles such as nodeAdmin or resourceGrant permissions in Apache VCL are affected by CVE-2013-0267.
Versions of Apache VCL prior to 2.3.2, 2.2.2, and 2.1 are vulnerable to CVE-2013-0267.