This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Openstack First view 2012-10-22
Product Swift Last view 2023-01-18
Version 1.3.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:openstack:swift

Activity : Overall

Related : CVE

  Date Alert Description
6.5 2023-01-18 CVE-2022-47950

An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).

4.3 2021-06-02 CVE-2017-8761

In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.

9.8 2017-11-21 CVE-2017-16613

An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.

7.5 2016-01-29 CVE-2016-0738

OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.

7.5 2016-01-29 CVE-2016-0737

OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.

5 2015-10-26 CVE-2015-5223

OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.

5.5 2015-04-17 CVE-2015-1856

OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.

4 2014-10-17 CVE-2014-7960

OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.

5.8 2014-02-18 CVE-2013-6396

The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

4 2013-08-20 CVE-2013-4155

OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.

9.8 2012-10-22 CVE-2012-4406

OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.

CWE : Common Weakness Enumeration

%idName
27% (3) CWE-399 Resource Management Errors
18% (2) CWE-200 Information Exposure
9% (1) CWE-552 Files or Directories Accessible to External Parties
9% (1) CWE-502 Deserialization of Untrusted Data
9% (1) CWE-310 Cryptographic Issues
9% (1) CWE-287 Improper Authentication
9% (1) CWE-264 Permissions, Privileges, and Access Controls
9% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OpenVAS Exploits

id Description
2012-10-19 Name : Fedora Update for openstack-swift FEDORA-2012-15642
File : nvt/gb_fedora_2012_15642_openstack-swift_fc17.nasl
2012-10-09 Name : Fedora Update for openstack-swift FEDORA-2012-15098
File : nvt/gb_fedora_2012_15098_openstack-swift_fc16.nasl

Nessus® Vulnerability Scanner

id Description
2017-11-22 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4044.nasl - Type: ACT_GATHER_INFO
2017-10-12 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3451-1.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2016-2256c80a94.nasl - Type: ACT_GATHER_INFO
2016-03-02 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2016-0328.nasl - Type: ACT_GATHER_INFO
2016-03-02 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2016-0329.nasl - Type: ACT_GATHER_INFO
2015-08-10 Name: The remote Fedora host is missing a security update.
File: fedora_2015-12245.nasl - Type: ACT_GATHER_INFO
2015-08-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2704-1.nasl - Type: ACT_GATHER_INFO
2014-03-22 Name: The remote Fedora host is missing a security update.
File: fedora_2014-3054.nasl - Type: ACT_GATHER_INFO
2013-10-24 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2001-1.nasl - Type: ACT_GATHER_INFO
2013-08-20 Name: The remote Fedora host is missing a security update.
File: fedora_2013-14477.nasl - Type: ACT_GATHER_INFO
2013-08-15 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2737.nasl - Type: ACT_GATHER_INFO
2013-06-21 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-1887-1.nasl - Type: ACT_GATHER_INFO
2012-10-18 Name: The remote Fedora host is missing a security update.
File: fedora_2012-15642.nasl - Type: ACT_GATHER_INFO
2012-10-08 Name: The remote Fedora host is missing a security update.
File: fedora_2012-15098.nasl - Type: ACT_GATHER_INFO