CVE-2014-0006
Published Jan 23, 2014
Last updated 11 years ago
Overview
- Description
- The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:swift:1.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F65289A-8F41-4DFC-9B7E-C45F2A572C3E" }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EE50F0A-4411-48AC-89DD-530B44C46256" }, { "criteria": "cpe:2.3:a:openstack:swift:1.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CF91F03-51B1-4CF6-AE2A-2A03CFE2000A" }, { "criteria": "cpe:2.3:a:openstack:swift:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3697251-8EEA-4458-9717-155EAD0915F7" }, { "criteria": "cpe:2.3:a:openstack:swift:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9A118EA-10DD-4B99-9B49-9A36580C44CE" }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E42DBA52-96EE-4662-8CB2-C2606E75CBA6" }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29F37244-947C-479B-9F52-5D22BC5276EA" }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ED958FC-7275-4CF5-90A7-D05ACE84B523" }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "945E4B61-33E9-4578-B778-231ACD281A40" }, { "criteria": "cpe:2.3:a:openstack:swift:1.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "953ED594-AF1B-4580-BC8D-05EF3CD71F6D" }, { "criteria": "cpe:2.3:a:openstack:swift:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2743AB4B-6A56-4E86-A5D7-3D1066032202" }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88450C19-E1A9-4FA5-B29E-E6A91D10B606" }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46585CF1-B9BE-4CAC-9ED1-F7F1F191C042" }, { "criteria": "cpe:2.3:a:openstack:swift:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2F18A12-1992-42A7-B92E-1E4164215504" }, { "criteria": "cpe:2.3:a:openstack:swift:1.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50846E0D-A4A7-440E-9E89-897DA8492889" }, { "criteria": "cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8597C3D7-2CFA-439B-82D6-2A651F74E5BB" } ], "operator": "OR" } ] } ]