Cross-site request forgery (CSRF) vulnerability in the management console (openshift-console/app/controllers/application_controller.rb) in OpenShift 0.0.5 allows remote attackers to hijack the authentication of arbitrary users via unspecified vectors.
Max CVSS
6.8
EPSS Score
0.21%
Published
2012-12-18
Updated
2023-02-13
node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.
Max CVSS
7.5
EPSS Score
1.11%
Published
2013-02-24
Updated
2023-02-13
Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO.
Max CVSS
5.8
EPSS Score
0.41%
Published
2013-02-24
Updated
2013-02-26
rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels.
Max CVSS
2.1
EPSS Score
0.04%
Published
2013-02-24
Updated
2013-02-26
RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process.
Max CVSS
7.5
EPSS Score
0.91%
Published
2019-11-19
Updated
2019-11-21
Nokogiri before 1.5.4 is vulnerable to XXE attacks
Max CVSS
7.5
EPSS Score
0.18%
Published
2020-02-19
Updated
2021-07-15
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS
Max CVSS
5.5
EPSS Score
0.04%
Published
2019-12-05
Updated
2019-12-14
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
Max CVSS
3.6
EPSS Score
0.04%
Published
2013-02-24
Updated
2023-02-13
cartridges/openshift-origin-cartridge-mongodb-2.2/info/bin/dump.sh in OpenShift does not properly create files in /tmp.
Max CVSS
7.5
EPSS Score
0.09%
Published
2019-11-01
Updated
2023-02-13
A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
Max CVSS
6.5
EPSS Score
0.07%
Published
2019-12-30
Updated
2023-02-13
The download_from_url function in OpenShift Origin allows remote attackers to execute arbitrary commands via shell metacharacters in the URL of a request to download a cart.
Max CVSS
10.0
EPSS Score
0.80%
Published
2020-01-28
Updated
2020-01-30
OpenShift cartridge allows remote URL retrieval
Max CVSS
8.1
EPSS Score
0.06%
Published
2019-12-03
Updated
2019-12-13
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem.
Max CVSS
4.6
EPSS Score
0.04%
Published
2014-01-03
Updated
2023-02-13
The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
Max CVSS
7.5
EPSS Score
2.68%
Published
2013-10-28
Updated
2018-01-09
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.
Max CVSS
7.5
EPSS Score
0.06%
Published
2022-10-19
Updated
2022-10-21
In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem file on the broker server, which could allow users with local access to the broker to read this file.
Max CVSS
5.5
EPSS Score
0.04%
Published
2022-10-19
Updated
2022-10-21
(1) oo-analytics-export and (2) oo-analytics-import in the openshift-origin-broker-util package in Red Hat OpenShift Enterprise 1 and 2 allow local users to have unspecified impact via a symlink attack on an unspecified file in /tmp.
Max CVSS
7.8
EPSS Score
0.04%
Published
2018-01-08
Updated
2018-02-01
In a openshift node, there is a cron job to update mcollective facts that mishandles a temporary file. This may lead to loss of confidentiality and integrity.
Max CVSS
9.1
EPSS Score
0.19%
Published
2022-06-30
Updated
2022-07-11
The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
Max CVSS
5.9
EPSS Score
0.16%
Published
2019-11-05
Updated
2019-11-12
node-connect before 2.8.1 has XSS in the Sencha Labs Connect middleware
Max CVSS
6.1
EPSS Score
0.36%
Published
2019-12-11
Updated
2019-12-17
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-11-15
Updated
2019-11-20
Openshift has shell command injection flaws due to unsanitized data being passed into shell commands.
Max CVSS
9.0
EPSS Score
0.10%
Published
2019-12-11
Updated
2019-12-16
openshift-origin-broker-util, as used in Red Hat OpenShift Enterprise 1.2.7 and 2.0.5, uses world-readable permissions for the mcollective client.cfg configuration file, which allows local users to obtain credentials and other sensitive information by reading the file.
Max CVSS
2.1
EPSS Score
0.04%
Published
2014-05-05
Updated
2023-02-13
mcollective has a default password set at install
Max CVSS
9.8
EPSS Score
0.46%
Published
2019-12-13
Updated
2023-02-13
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to a passthrough trigger.
Max CVSS
7.5
EPSS Score
0.62%
Published
2014-04-24
Updated
2023-02-13
146 vulnerabilities found
1 2 3 4 5 6
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!