CVE-2013-4428

N/A Unknown
Published: October 27, 2013 Modified: April 29, 2026
View on NVD

Description

OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1525.html
Source: secalert@redhat.com
Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/15/8
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/16/9
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/63159
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2003-1
Source: secalert@redhat.com
Third Party Advisory
https://bugs.launchpad.net/glance/+bug/1235226
Source: secalert@redhat.com
Exploit Third Party Advisory
https://bugs.launchpad.net/glance/+bug/1235378
Source: secalert@redhat.com
Exploit Third Party Advisory
https://launchpad.net/glance/+milestone/2013.1.4
Source: secalert@redhat.com
Patch Third Party Advisory
https://launchpad.net/glance/+milestone/2013.2
Source: secalert@redhat.com
Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1525.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/15/8
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/16/9
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/63159
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2003-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugs.launchpad.net/glance/+bug/1235226
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://bugs.launchpad.net/glance/+bug/1235378
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://launchpad.net/glance/+milestone/2013.1.4
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://launchpad.net/glance/+milestone/2013.2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
53th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

canonical openstack