First published: Wed Jan 07 2015(Updated: )
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack for IBM Power | =4.0 | |
Red Hat OpenStack for IBM Power | =5.0 | |
OpenStack Glance | >=2014.1<2014.1.4 | |
OpenStack Glance | >=2014.2<2014.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9493 is rated as high severity due to the potential for authenticated users to read or delete arbitrary files.
To fix CVE-2014-9493, update your OpenStack Glance to a version higher than 2014.2.2 or 2014.1.4.
CVE-2014-9493 affects installations of OpenStack Image Registry and Delivery Service (Glance) versions before 2014.2.2 and 2014.1.4.
CVE-2014-9493 is a path traversal vulnerability that allows remote authenticated users to access unauthorized files.
Yes, CVE-2014-9493 can be exploited remotely by authenticated users through crafted file: URLs.