CVE-2015-5271: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
A flaw was discovered in the pipeline ordering of OpenStack Object Storage’s staticweb middleware in the swiftproxy configuration generated from the openstack-tripleo-heat-templates package (OpenStack director). The staticweb middleware was incorrectly configured before the Identity Service, and under some conditions an attacker could use this flaw to gain unauthenticated access to private data.
References
- access.redhat.com/errata/RHSA-2015:1862
- access.redhat.com/security/cve/CVE-2015-5271
- bugs.launchpad.net/tripleo/+bug/1494896
- bugzilla.redhat.com/show_bug.cgi?id=1261697
- git.openstack.org/cgit/openstack/tripleo-heat-templates/commit/?id=1730d95acdbee7c7bbcfe1eba8a48ef2b0cc1476
- github.com/advisories/GHSA-8936-44gw-7664
- launchpadlibrarian.net/217268516/CVE-2015-5271_puppet-swift.patch
- nvd.nist.gov/vuln/detail/CVE-2015-5271
- review.openstack.org/226541
Detect and mitigate CVE-2015-5271 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →