A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T19:50:15.563Z
Reserved: 2017-10-08T00:00:00
Link: CVE-2017-15103

No data.

Status : Modified
Published: 2017-12-18T19:29:00.200
Modified: 2024-11-21T03:14:04.783
Link: CVE-2017-15103
