{
  "threat_severity" : "Important",
  "public_date" : "2014-12-15T00:00:00Z",
  "bugzilla" : {
    "description" : "openstack-glance: unrestricted path traversal flaw",
    "id" : "1174474",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1174474"
  },
  "cvss" : {
    "cvss_base_score" : "5.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:S/C:P/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.", "It was discovered that an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user. Note that only setups using the OpenStack Image V2 API were affected by this flaw." ],
  "affected_release" : [ {
    "product_name" : "OpenStack 4 for RHEL 6",
    "release_date" : "2015-02-19T00:00:00Z",
    "advisory" : "RHSA-2015:0246",
    "cpe" : "cpe:/a:redhat:openstack:4::el6",
    "package" : "openstack-glance-0:2013.2.4-3.el6ost"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
    "release_date" : "2015-02-19T00:00:00Z",
    "advisory" : "RHSA-2015:0246",
    "cpe" : "cpe:/a:redhat:openstack:5::el6",
    "package" : "openstack-glance-0:2014.1.3-4.el6ost"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
    "release_date" : "2015-02-19T00:00:00Z",
    "advisory" : "RHSA-2015:0246",
    "cpe" : "cpe:/a:redhat:openstack:5::el7",
    "package" : "openstack-glance-0:2014.1.3-4.el7ost"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6 (Juno)",
    "fix_state" : "Affected",
    "package_name" : "openstack-glance",
    "cpe" : "cpe:/a:redhat:openstack:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-9493\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-9493" ],
  "name" : "CVE-2014-9493",
  "mitigation" : {
    "value" : "diff --git a/etc/policy.json b/etc/policy.json\nindex 325f00b..a797f12 100644\n--- a/etc/policy.json\n+++ b/etc/policy.json\n@@ -13,9 +13,9 @@\n\"download_image\": \"\",\n\"upload_image\": \"\",\n-    \"delete_image_location\": \"\",\n-    \"get_image_location\": \"\",\n-    \"set_image_location\": \"\",\n+    \"delete_image_location\": \"role:admin\",\n+    \"get_image_location\": \"role:admin\",\n+    \"set_image_location\": \"role:admin\",\n\"add_member\": \"\",\n\"delete_member\": \"\",",
    "lang" : "en:us"
  },
  "csaw" : false
}