================================================== OSSA-2015-016: Information leak via Swift tempurls ================================================== :Date: August 26, 2015 :CVE: CVE-2015-5223 Affects ~~~~~~~ - Swift: versions through 2.3.0 Description ~~~~~~~~~~~ Richard Hawkins from Rackspace and Swift core reviewers reported a vulnerability in Swift tempurls. When in possession of a tempurl key authorized for PUT, a malicious actor may retrieve other objects in the same Swift account (tenant). All Swift setups are affected. Patches ~~~~~~~ - https://review.openstack.org/217253 (Juno) - https://review.openstack.org/217254 (Kilo) - https://review.openstack.org/217255 (Kilo) - https://review.openstack.org/217259 (Liberty) - https://review.openstack.org/217260 (Liberty) Credits ~~~~~~~ - Richard Hawkins from Rackspace (CVE-2015-5223) - Swift core reviewers from OpenStack (CVE-2015-5223) References ~~~~~~~~~~ - https://launchpad.net/bugs/1453948 - https://launchpad.net/bugs/1449212 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5223 Notes ~~~~~ - This fix will be included in future 2014.2.4 (juno) and 2015.1.2 (kilo) releases. -- Tristan Cacqueray OpenStack Vulnerability Management Team -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 473 bytes Desc: OpenPGP digital signature URL: <http://lists.openstack.org/pipermail/openstack/attachments/20150826/cae7817c/attachment.sig>