cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-32498,https://securityvulnerability.io/vulnerability/CVE-2024-32498,"Unauthorized Access to Sensitive Data via Custom QCOW2 External Data in OpenStack Cinder, Glance, and Nova","A critical security vulnerability (CVE-2024-32498) has been discovered in OpenStack, affecting the Cinder, Glance, and Nova components. The flaw allows attackers to gain unauthorized access to sensitive data by supplying a crafted QCOW2 image that references a specific data file path, potentially exposing confidential information. The vulnerability poses a risk of unauthorized access, data breaches, and the compromise of cloud environments, with the potential for significant legal and financial consequences. It has been classified as critical with a high severity score. Mitigation patches have been released by Red Hat and the OpenStack community, and system administrators are advised to apply these updates promptly.",OpenStack,"Nova,Glance,Cinder",6.5,MEDIUM,0.000699999975040555,false,true,false,false,,false,false,2024-07-05T02:15:00.000Z,0 CVE-2022-47951,https://securityvulnerability.io/vulnerability/CVE-2022-47951,,"An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.",Openstack,"Nova,Glance,Cinder",5.7,MEDIUM,0.0020000000949949026,false,false,false,false,,false,false,2023-01-26T00:00:00.000Z,0 CVE-2016-8611,https://securityvulnerability.io/vulnerability/CVE-2016-8611,,"A vulnerability was found in Openstack Glance. No limits are enforced within the Glance image service for both v1 and v2 `/images` API POST method for authenticated users, resulting in possible denial of service attacks through database table saturation.",The Openstack Foundation,Openstack-glance,4.3,MEDIUM,0.001979999942705035,false,false,false,false,,false,false,2018-07-31T20:00:00.000Z,0 CVE-2015-8234,https://securityvulnerability.io/vulnerability/CVE-2015-8234,,"The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypass the signature verification process via a crafted image, which triggers an MD5 collision.",Openstack,Glance,5.5,MEDIUM,0.001970000099390745,false,false,false,false,,false,false,2017-03-29T14:00:00.000Z,0 CVE-2017-7200,https://securityvulnerability.io/vulnerability/CVE-2017-7200,,"An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service.",Openstack,Glance,5.8,MEDIUM,0.0020200000144541264,false,false,false,false,,false,false,2017-03-21T06:21:00.000Z,0 CVE-2015-5162,https://securityvulnerability.io/vulnerability/CVE-2015-5162,,"The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.",Openstack,"Nova,Glance,Cinder",7.5,HIGH,0.02353999949991703,false,false,false,false,,false,false,2016-10-07T14:00:00.000Z,0 CVE-2016-0757,https://securityvulnerability.io/vulnerability/CVE-2016-0757,,"OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.",Openstack,Image Registry And Delivery Service \(glance\),4.3,MEDIUM,0.0011399999493733048,false,false,false,false,,false,false,2016-04-13T17:00:00.000Z,0 CVE-2015-5286,https://securityvulnerability.io/vulnerability/CVE-2015-5286,,OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9623.,Openstack,Image Registry And Delivery Service \(glance\),,,0.002460000105202198,false,false,false,false,,false,false,2015-10-26T17:00:00.000Z,0 CVE-2015-5251,https://securityvulnerability.io/vulnerability/CVE-2015-5251,,OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*.,Openstack,Image Registry And Delivery Service \(glance\),,,0.0012100000167265534,false,false,false,false,,false,false,2015-10-26T17:00:00.000Z,0 CVE-2015-5163,https://securityvulnerability.io/vulnerability/CVE-2015-5163,,"The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image.",Openstack,Glance,,,0.0016899999463930726,false,false,false,false,,false,false,2015-08-19T15:00:00.000Z,0 CVE-2015-3289,https://securityvulnerability.io/vulnerability/CVE-2015-3289,,OpenStack Glance before 2015.1.1 (kilo) allows remote authenticated users to cause a denial of service (disk consumption) by repeatedly using the import task flow API to create images and then deleting them.,Openstack,Glance,,,0.002460000105202198,false,false,false,false,,false,false,2015-08-14T18:00:00.000Z,0 CVE-2014-9684,https://securityvulnerability.io/vulnerability/CVE-2014-9684,,"OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.",Openstack,Image Registry And Delivery Service \(glance\),,,0.006719999946653843,false,false,false,false,,false,false,2015-02-24T15:00:00.000Z,0 CVE-2015-1881,https://securityvulnerability.io/vulnerability/CVE-2015-1881,,"OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.",Openstack,Image Registry And Delivery Service \(glance\),,,0.006719999946653843,false,false,false,false,,false,false,2015-02-24T15:00:00.000Z,0 CVE-2015-1195,https://securityvulnerability.io/vulnerability/CVE-2015-1195,,The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a filesystem: URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.,Openstack,Image Registry And Delivery Service \(glance\),,,0.008999999612569809,false,false,false,false,,false,false,2015-01-21T18:00:00.000Z,0 CVE-2014-5356,https://securityvulnerability.io/vulnerability/CVE-2014-5356,,"OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image.",Openstack,"Image Registry And Delivery Service \(glance\),Ubuntu Linux",,,0.006920000072568655,false,false,false,false,,false,false,2014-08-25T14:00:00.000Z,0 CVE-2014-0162,https://securityvulnerability.io/vulnerability/CVE-2014-0162,,The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location.,Openstack,"Image Registry And Delivery Service \(glance\),Icehouse",,,0.0032500000670552254,false,false,false,false,,false,false,2014-04-27T20:00:00.000Z,0 CVE-2014-1948,https://securityvulnerability.io/vulnerability/CVE-2014-1948,,"OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehouse before icehouse-2 logs a URL containing the Swift store backend password when authentication fails and WARNING level logging is enabled, which allows local users to obtain sensitive information by reading the log.",Openstack,Image Registry And Delivery Service \(glance\),,,0.0004199999966658652,false,false,false,false,,false,false,2014-02-14T15:00:00.000Z,0 CVE-2013-4354,https://securityvulnerability.io/vulnerability/CVE-2013-4354,,The API before 2.1 in OpenStack Image Registry and Delivery Service (Glance) makes it easier for local users to inject images into arbitrary tenants by adding the tenant as a member of the image.,Openstack,Image Registry And Delivery Service \(glance\),,,0.0004199999966658652,false,false,false,false,,false,false,2013-11-23T17:00:00.000Z,0 CVE-2013-4428,https://securityvulnerability.io/vulnerability/CVE-2013-4428,,"OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.",Openstack,Glance,,,0.005739999935030937,false,false,false,false,,false,false,2013-10-27T00:00:00.000Z,0 CVE-2013-1840,https://securityvulnerability.io/vulnerability/CVE-2013-1840,,"The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.",Openstack,Glance,,,0.0023799999617040157,false,false,false,false,,false,false,2013-03-22T21:00:00.000Z,0 CVE-2013-0212,https://securityvulnerability.io/vulnerability/CVE-2013-0212,,"store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated users to obtain sensitive information by reading the error messages.",Openstack,Image Registry And Delivery Service \(glance\),,,0.0017300000181421638,false,false,false,true,true,false,false,2013-02-24T21:00:00.000Z,0 CVE-2012-4573,https://securityvulnerability.io/vulnerability/CVE-2012-4573,,"The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request, a different vulnerability than CVE-2012-5482.",Openstack,"Image Registry And Delivery Service \(glance\),Essex,Folsom",,,0.003869999898597598,false,false,false,false,,false,false,2012-11-11T11:00:00.000Z,0 CVE-2012-5482,https://securityvulnerability.io/vulnerability/CVE-2012-5482,,"The v2 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4573.",Openstack,"Image Registry And Delivery Service \(glance\),Essex,Folsom",,,0.004720000084489584,false,false,false,false,,false,false,2012-11-11T11:00:00.000Z,0