The Piranha Configuration Tool in Piranha 0.8.6 does not properly restrict access to webpages, which allows remote attackers to bypass authentication and read or modify the LVS configuration via an HTTP POST request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Piranha | Ryan_ohara | 0.8.6 (including) | 0.8.6 (including) |
Red Hat Enterprise Linux 5 | RedHat | piranha-0:0.8.4-26.el5_10.1 | * |
Red Hat Enterprise Linux 6 | RedHat | piranha-0:0.8.6-4.el6_5.2 | * |