Vulnerability Description
A flaw was found in PackStack. This vulnerability allows a local user to modify deployed systems by changing the answer file, which is created in insecure directories such as /tmp or the current working directory. This insecure file creation could lead to unauthorized system modifications.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openstack Essex | - |
| Redhat | Openstack Folsom | - |
| Redhat | Packstack | 2012.2.3 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-0671.htmlVendor Advisory
- https://access.redhat.com/security/cve/CVE-2013-1815
- https://bugzilla.redhat.com/show_bug.cgi?id=917904Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83017
- http://rhn.redhat.com/errata/RHSA-2013-0671.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=917904Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83017
FAQ
What is CVE-2013-1815?
CVE-2013-1815 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A flaw was found in PackStack. This vulnerability allows a local user to modify deployed systems by changing the answer file, which is created in insecure directories such as /tmp or the current worki...
How severe is CVE-2013-1815?
CVE-2013-1815 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1815?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openstack Essex, Redhat Openstack Folsom, Redhat Packstack.