blob: 057f433194bd09a8a4881b0a2dbb057952fe7324 [file] [log] [blame]
"use strict";(self.webpackChunkwebsite=self.webpackChunkwebsite||[]).push([[3920],{3905:(e,t,r)=>{r.d(t,{Zo:()=>s,kt:()=>m});var n=r(67294);function a(e,t,r){return t in e?Object.defineProperty(e,t,{value:r,enumerable:!0,configurable:!0,writable:!0}):e[t]=r,e}function l(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter((function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable}))),r.push.apply(r,n)}return r}function o(e){for(var t=1;t<arguments.length;t++){var r=null!=arguments[t]?arguments[t]:{};t%2?l(Object(r),!0).forEach((function(t){a(e,t,r[t])})):Object.getOwnPropertyDescriptors?Object.defineProperties(e,Object.getOwnPropertyDescriptors(r)):l(Object(r)).forEach((function(t){Object.defineProperty(e,t,Object.getOwnPropertyDescriptor(r,t))}))}return e}function i(e,t){if(null==e)return{};var r,n,a=function(e,t){if(null==e)return{};var r,n,a={},l=Object.keys(e);for(n=0;n<l.length;n++)r=l[n],t.indexOf(r)>=0||(a[r]=e[r]);return a}(e,t);if(Object.getOwnPropertySymbols){var l=Object.getOwnPropertySymbols(e);for(n=0;n<l.length;n++)r=l[n],t.indexOf(r)>=0||Object.prototype.propertyIsEnumerable.call(e,r)&&(a[r]=e[r])}return a}var c=n.createContext({}),u=function(e){var t=n.useContext(c),r=t;return e&&(r="function"==typeof e?e(t):o(o({},t),e)),r},s=function(e){var t=u(e.components);return n.createElement(c.Provider,{value:t},e.children)},p="mdxType",d={inlineCode:"code",wrapper:function(e){var t=e.children;return n.createElement(n.Fragment,{},t)}},f=n.forwardRef((function(e,t){var r=e.components,a=e.mdxType,l=e.originalType,c=e.parentName,s=i(e,["components","mdxType","originalType","parentName"]),p=u(r),f=a,m=p["".concat(c,".").concat(f)]||p[f]||d[f]||l;return r?n.createElement(m,o(o({ref:t},s),{},{components:r})):n.createElement(m,o({ref:t},s))}));function m(e,t){var r=arguments,a=t&&t.mdxType;if("string"==typeof e||a){var l=r.length,o=new Array(l);o[0]=f;var i={};for(var c in t)hasOwnProperty.call(t,c)&&(i[c]=t[c]);i.originalType=e,i[p]="string"==typeof e?e:a,o[1]=i;for(var u=2;u<l;u++)o[u]=r[u];return n.createElement.apply(null,o)}return n.createElement.apply(null,r)}f.displayName="MDXCreateElement"},85987:(e,t,r)=>{r.r(t),r.d(t,{assets:()=>c,contentTitle:()=>o,default:()=>d,frontMatter:()=>l,metadata:()=>i,toc:()=>u});var n=r(87462),a=(r(67294),r(3905));const l={layout:"post",title:"[CVE-2013-6398] CloudStack Virtual Router stop/start modifies firewall rules allowing additional access",tags:["announcement"],slug:"cve_2013_6398_cloudstack_virtual"},o=void 0,i={permalink:"/blog/cve_2013_6398_cloudstack_virtual",editUrl:"https://github.com/apache/cloudstack-www/tree/main/blog/2014-01-10-cve_2013_6398_cloudstack_virtual.md",source:"@site/blog/2014-01-10-cve_2013_6398_cloudstack_virtual.md",title:"[CVE-2013-6398] CloudStack Virtual Router stop/start modifies firewall rules allowing additional access",description:"Product: Apache CloudStack",date:"2014-01-10T00:00:00.000Z",formattedDate:"January 10, 2014",tags:[{label:"announcement",permalink:"/blog/tags/announcement"}],hasTruncateMarker:!1,authors:[],frontMatter:{layout:"post",title:"[CVE-2013-6398] CloudStack Virtual Router stop/start modifies firewall rules allowing additional access",tags:["announcement"],slug:"cve_2013_6398_cloudstack_virtual"},prevItem:{title:"Announcing Apache CloudStack 4.2.1",permalink:"/blog/announcing_apache_cloudstack_4_21"},nextItem:{title:"[CVE-2014-0031] CloudStack ListNetworkACL API discloses ACLs for other users",permalink:"/blog/cve_2014_0031_cloudstack_listnetworkacl"}},c={authorsImageUrls:[]},u=[],s={toc:u},p="wrapper";function d(e){let{components:t,...r}=e;return(0,a.kt)(p,(0,n.Z)({},s,r,{components:t,mdxType:"MDXLayout"}),(0,a.kt)("p",null,"Product: Apache CloudStack",(0,a.kt)("br",null),"Vendor: Apache Software Foundation",(0,a.kt)("br",null),"Vulnerability type: Bypass",(0,a.kt)("br",null),"Vulnerable Versions: Apache CloudStack 4.1.0, 4.1.1, 4.2.0",(0,a.kt)("br",null),"CVE References: CVE-2013-2136",(0,a.kt)("br",null),"Risk Level: Low",(0,a.kt)("br",null),"CVSSv2 Base Scores: 2.8 (AV:N/AC:M/Au:M/C:P/I:N/A:N)",(0,a.kt)("br",null)),(0,a.kt)("p",null,"Description:"),(0,a.kt)("p",null,"The Apache CloudStack Security Team was notified of a an issue in the Apache CloudStack virtual router that failed to preserve source restrictions in firewall rules after a virtual router had been stopped and restarted."),(0,a.kt)("p",null,"Mitigation:"),(0,a.kt)("p",null,"Upgrading to CloudStack 4.2.1 or higher will mitigate this issue."),(0,a.kt)("p",null,"References:"),(0,a.kt)("p",null,"https://issues.apache.org/jira/browse/CLOUDSTACK-5263"),(0,a.kt)("p",null,"Credit:"),(0,a.kt)("p",null,"This issue was identified by the Cloud team at Schuberg Philis"))}d.isMDXComponent=!0}}]);