CVE-2013-2161

Impact:
Moderate
Public Date:
2013-06-13
Bugzilla:
972988: CVE-2013-2161 OpenStack Swift: Unchecked user input in Swift XML responses

The MITRE CVE dictionary describes this issue as:

XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.

Find out more about CVE-2013-2161 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having moderate security impact in OpenStack Essex (1.0) and Openstack Folsom (2.1). A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 3.0 (openstack-swift) RHSA-2013:0993 2013-06-27

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 2.1 openstack-swift Will not fix
Red Hat Gluster Storage 2.1 gluster-swift Will not fix
Red Hat Gluster Storage 2.0 gluster-swift Will not fix
RHOS Essex Release openstack-swift Will not fix

Acknowledgements

Red Hat would like to thank Alex Gaynor from Rackspace for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.