First published: Wed Jan 21 2015(Updated: )
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a `filesystem://` URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/glance | <11.0.0a0 | 11.0.0a0 |
OpenStack Glance | >=2014.1<2014.1.4 | |
OpenStack Glance | >=2014.2<2014.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1195 is a medium severity vulnerability that allows remote authenticated users to access or delete arbitrary files.
To mitigate CVE-2015-1195, upgrade OpenStack Image Registry and Delivery Service (Glance) to version 11.0.0a0 or later.
CVE-2015-1195 affects OpenStack Glance versions prior to 2014.1.4 and 2014.2.x versions before 2014.2.2.
The impact of CVE-2015-1195 is that it allows remote authenticated users to read or delete files by using a filesystem URL.
Administrators using affected versions of OpenStack Glance with remote authenticated users are vulnerable to CVE-2015-1195.