Openstack Image Registry And Delivery Service vulnerabilities
12 known vulnerabilities affecting openstack/image_registry_and_delivery_service.
Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM11LOW1
Vulnerabilities
Page 1 of 1
CVE-2016-0757MEDIUMCVSS 4.3v11.0.0v11.0.1+1 more2016-04-13
CVE-2016-0757 [MEDIUM] CWE-284 CVE-2016-0757: OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when sho
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
nvd
CVE-2015-5286MEDIUMCVSS 6.8≤ 2014.2.3v2015.1.0+1 more2015-10-26
CVE-2015-5286 [MEDIUM] CVE-2015-5286: OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows r
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability exists because of an incomplete fix for CVE
nvd
CVE-2015-5251MEDIUMCVSS 5.5≤ 2014.2.3v2015.1.0+1 more2015-10-26
CVE-2015-5251 [MEDIUM] CWE-264 CVE-2015-5251: OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow re
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*.
nvd
CVE-2014-9684MEDIUMCVSS 4.0v2014.2v2014.2.1+1 more2015-02-24
CVE-2014-9684 [MEDIUM] CWE-399 CVE-2014-9684: OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly rem
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881
nvd
CVE-2015-1881MEDIUMCVSS 4.0v2014.2v2014.2.1+1 more2015-02-24
CVE-2015-1881 [MEDIUM] CVE-2015-1881: OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly rem
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.
nvd
CVE-2014-9623MEDIUMCVSS 4.0≤ 2014.1.3v2014.22015-01-23
CVE-2014-9623 [MEDIUM] CWE-399 CVE-2014-9623: OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting an image in the saving state.
nvd
CVE-2015-1195MEDIUMCVSS 6.5≥ 2014.1, < 2014.1.4≥ 2014.2, < 2014.2.22015-01-21
CVE-2015-1195 [MEDIUM] CVE-2015-1195: The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x be
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a filesystem: URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.
nvd
CVE-2014-9493MEDIUMCVSS 5.5≥ 2014.1, < 2014.1.4≥ 2014.2, < 2014.2.22015-01-07
CVE-2014-9493 [MEDIUM] CWE-264 CVE-2014-9493: The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 al
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.
nvd
CVE-2014-5356MEDIUMCVSS 4.0≤ 2013.2.3v2013.2+7 more2014-08-25
CVE-2014-5356 [MEDIUM] CWE-264 CVE-2014-5356: OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and
OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image.
nvd
CVE-2014-0162MEDIUMCVSS 6.0v2013.2v2013.2.1+2 more2014-04-27
CVE-2014-0162 [MEDIUM] CWE-20 CVE-2014-0162: The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.
The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location.
nvd
CVE-2014-1948LOWCVSS 2.6v2013.2v2013.2.12014-02-14
CVE-2014-1948 [LOW] CWE-255 CVE-2014-1948: OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehouse before i
OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehouse before icehouse-2 logs a URL containing the Swift store backend password when authentication fails and WARNING level logging is enabled, which allows local users to obtain sensitive information by reading the log.
nvd
CVE-2013-0212MEDIUMCVSS 4.0v2012.1v2012.2+2 more2013-02-24
CVE-2013-0212 [MEDIUM] CWE-200 CVE-2013-0212: store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, whe
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated users to obtain sensitive information by reading the error messages.
nvd