CVE-2014-0056
Published May 8, 2014
Last updated 2 years ago
Overview
- Description
- The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:neutron:2012.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA0A288F-3646-4AE8-929B-34396D48959C" }, { "criteria": "cpe:2.3:a:openstack:neutron:2012.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9C9059C-E2E3-43F3-AF67-16F12E8E6A75" }, { "criteria": "cpe:2.3:a:openstack:neutron:2012.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29EF5428-2B02-45D1-A169-C8B4AD08440F" }, { "criteria": "cpe:2.3:a:openstack:neutron:2012.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2E92974-39AD-4837-A3F0-6875E100366F" }, { "criteria": "cpe:2.3:a:openstack:neutron:2012.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC68EC6-B12C-48B5-8B42-2BA2F85EB040" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22D37364-1253-495F-A3E0-CA4CEFBF2587" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49D7F58E-536B-4E57-B02E-AB2A39AA4EAF" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81C24D0C-8F7B-48D3-825C-AC3ACD87F461" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0774CBBB-8DF6-468F-AFD9-0C0FE314FF10" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CCC7C3A-8E5B-447B-B339-1328C6DDDF9F" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AE37F27-FCDA-413C-8A3C-B3ED56BB7A37" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5EFDBB0-BCCD-42C4-ADFB-1C92BD5E9537" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6772F036-DD92-40C4-AAAA-227BD41162FA" }, { "criteria": "cpe:2.3:a:openstack:neutron:2013.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B90A2150-AAC4-468E-ABF6-59071E02D911" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91" } ], "operator": "OR" } ] } ]