Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openshift_origin
(Redhat)Repositories | https://github.com/openshift/origin-server |
#Vulnerabilities | 10 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-02-24 | CVE-2012-5646 | node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO. | Openshift, Openshift_origin | N/A | ||
2013-02-24 | CVE-2013-0164 | The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. | Openshift, Openshift_origin | N/A | ||
2014-06-20 | CVE-2014-3496 | cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file. | Openshift, Openshift_origin | N/A | ||
2015-09-08 | CVE-2015-5250 | The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data. | Openshift_origin | N/A | ||
2016-06-08 | CVE-2016-3711 | HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie. | Openshift, Openshift_origin | 3.3 | ||
2019-11-21 | CVE-2014-0084 | Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly. | Openshift_origin | 5.5 | ||
2019-11-13 | CVE-2014-3592 | OpenShift Origin: Improperly validated team names could allow stored XSS attacks | Openshift_origin | N/A | ||
2016-06-08 | CVE-2016-2160 | Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image. | Openshift, Openshift_origin | 8.8 | ||
2013-02-24 | CVE-2012-5658 | rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels. | Openshift, Openshift_origin | N/A | ||
2013-02-24 | CVE-2012-5647 | Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO. | Openshift, Openshift_origin | N/A |