62af610079
Prepare for repository publication by: - moving all YAML under ossa/ - cargo-culting doc building from openstack/governance - adding a LICENSE (CC 3.0 BY) Change-Id: I68354a7b75060ed5012e16048e40ffb61007ff9d
61 lines
1.3 KiB
YAML
61 lines
1.3 KiB
YAML
date: 2013-06-13
|
|
|
|
id: OSSA-2013-016
|
|
|
|
title: 'Unchecked user input in Swift XML responses'
|
|
|
|
description: 'Alex Gaynor from Rackspace reported a vulnerability in XML handling
|
|
within Swift account servers. Account strings were unescaped in XML listings, and
|
|
an attacker could potentially generate unparsable or arbitrary XML responses which
|
|
may be used to leverage other vulnerabilities in the calling software.'
|
|
|
|
reference: https://lists.launchpad.net/openstack/msg24373.html
|
|
|
|
affected-products:
|
|
|
|
- product: swift
|
|
version: All versions
|
|
|
|
vulnerabilities:
|
|
|
|
- cve-id: CVE-2013-2161
|
|
impact-assessment:
|
|
source: 'Red Hat Product Security'
|
|
rating: moderate
|
|
assessment:
|
|
type: CVSS2
|
|
score: 5.8
|
|
detail: AV:N/AC:M/Au:N/C:N/I:P/A:P
|
|
classification:
|
|
source: 'Red Hat Product Security'
|
|
type: CWE
|
|
detail: TODO
|
|
|
|
reporters:
|
|
|
|
- name: 'Alex Gaynor'
|
|
affiliation: Rackspace
|
|
reported:
|
|
- CVE-2013-2161
|
|
|
|
issues:
|
|
|
|
links:
|
|
- https://launchpad.net/bugs/1183884
|
|
|
|
type: launchpad
|
|
|
|
reviews:
|
|
|
|
havana:
|
|
- https://review.openstack.org/#/c/32905
|
|
- https://review.openstack.org/#/c/32982
|
|
|
|
grizzly:
|
|
- https://review.openstack.org/#/c/32909
|
|
|
|
folsom:
|
|
- https://review.openstack.org/#/c/32911
|
|
|
|
type: gerrit
|