The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:34:57.146Z
Reserved: 2013-07-05T00:00:00Z
Link: CVE-2013-4766

No data.

Status : Modified
Published: 2013-09-17T12:04:16.087
Modified: 2024-11-21T01:56:21.727
Link: CVE-2013-4766
