{
  "threat_severity" : "Moderate",
  "public_date" : "2013-06-13T00:00:00Z",
  "bugzilla" : {
    "description" : "Swift: Unchecked user input in Swift XML responses",
    "id" : "972988",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=972988"
  },
  "cvss" : {
    "cvss_base_score" : "5.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:P",
    "status" : "verified"
  },
  "details" : [ "XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name." ],
  "statement" : "The Red Hat Security Response Team has rated this issue as having moderate security impact in OpenStack Essex (1.0) and Openstack Folsom (2.1). A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "acknowledgement" : "Red Hat would like to thank Alex Gaynor (Rackspace) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "OpenStack 3 for RHEL 6",
    "release_date" : "2013-06-27T00:00:00Z",
    "advisory" : "RHSA-2013:0993",
    "cpe" : "cpe:/a:redhat:openstack:3::el6",
    "package" : "openstack-swift-0:1.8.0-6.el6ost"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Storage 2",
    "fix_state" : "Affected",
    "package_name" : "gluster-swift",
    "cpe" : "cpe:/a:redhat:storage:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-2161\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2161" ],
  "name" : "CVE-2013-2161",
  "csaw" : false
}