The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a filesystem: URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://lists.openstack.org/pipermail/openstack-announce/2015-January/000325.html | mailing list vendor advisory |
https://bugs.launchpad.net/ossa/+bug/1408663 | third party advisory |
http://www.openwall.com/lists/oss-security/2015/01/18/5 | third party advisory mailing list |
http://secunia.com/advisories/62169 | third party advisory |
http://www.openwall.com/lists/oss-security/2015/01/15/2 | third party advisory mailing list |
http://www.securityfocus.com/bid/71976 | vdb entry third party advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | third party advisory |