VYPR

Openshift Origin

by Red Hat

Source repositories

CVEs (5)

  • CVE-2014-3496Jun 20, 2014
    risk 0.00cvss epss 0.05

    cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.

  • CVE-2013-0164Feb 24, 2013
    risk 0.00cvss epss 0.00

    The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.

  • CVE-2012-5658Feb 24, 2013
    risk 0.00cvss epss 0.00

    rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels.

  • CVE-2012-5647Feb 24, 2013
    risk 0.00cvss epss 0.00

    Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO.

  • CVE-2012-5646Feb 24, 2013
    risk 0.00cvss epss 0.01

    node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.