First published: Sun Oct 27 2013(Updated: )
OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Glance (OpenStack) | >=2012.2<=2012.2.4 | |
Glance (OpenStack) | >=2013.1<2013.1.4 | |
Glance (OpenStack) | =2013.2-milestone1 | |
Glance (OpenStack) | =2013.2-milestone2 | |
Glance (OpenStack) | =2013.2-milestone3 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4428 is classified as a medium severity vulnerability due to its potential to expose restricted images to remote authenticated users.
To fix CVE-2013-4428, upgrade OpenStack Glance to version 2013.1.4 or later, or to 2013.2 version after milestone3.
CVE-2013-4428 affects users of OpenStack Glance prior to versions 2013.1.4 and 2013.2, as well as specific versions of Ubuntu Linux.
CVE-2013-4428 allows remote authenticated users to access cached images that should otherwise be restricted.
The consequences of CVE-2013-4428 include unauthorized access to sensitive image data, potentially compromising user privacy and security.