Product:

Openshift_origin

(Redhat)
Repositories https://github.com/openshift/origin-server
#Vulnerabilities 10
Date Id Summary Products Score Patch Annotated
2013-02-24 CVE-2012-5646 node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO. Openshift, Openshift_origin N/A
2013-02-24 CVE-2013-0164 The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. Openshift, Openshift_origin N/A
2014-06-20 CVE-2014-3496 cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file. Openshift, Openshift_origin N/A
2015-09-08 CVE-2015-5250 The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data. Openshift_origin N/A
2016-06-08 CVE-2016-3711 HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie. Openshift, Openshift_origin 3.3
2019-11-21 CVE-2014-0084 Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly. Openshift_origin 5.5
2019-11-13 CVE-2014-3592 OpenShift Origin: Improperly validated team names could allow stored XSS attacks Openshift_origin N/A
2016-06-08 CVE-2016-2160 Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image. Openshift, Openshift_origin 8.8
2013-02-24 CVE-2012-5658 rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels. Openshift, Openshift_origin N/A
2013-02-24 CVE-2012-5647 Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO. Openshift, Openshift_origin N/A