The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
References
Link | Resource |
---|---|
http://www.eucalyptus.com/resources/security/advisories/esa-13 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-09-17 05:04
Updated : 2013-09-18 09:54
NVD link : CVE-2013-4766
Mitre link : CVE-2013-4766
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
eucalyptus
- eucalyptus