Red Hat OpenShift Enterprise before 2.2 does not properly restrict access to gears, which allows remote attackers to access the network resources of arbitrary gears via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openshift | Redhat | * | 2.1.8 (including) |
Openshift | Redhat | 2.0 (including) | 2.0 (including) |
Openshift | Redhat | 2.0.1 (including) | 2.0.1 (including) |
Openshift | Redhat | 2.0.2 (including) | 2.0.2 (including) |
Openshift | Redhat | 2.0.3 (including) | 2.0.3 (including) |
Openshift | Redhat | 2.0.4 (including) | 2.0.4 (including) |
Openshift | Redhat | 2.0.5 (including) | 2.0.5 (including) |
Openshift | Redhat | 2.0.6 (including) | 2.0.6 (including) |
Openshift | Redhat | 2.1 (including) | 2.1 (including) |
Openshift | Redhat | 2.1.1 (including) | 2.1.1 (including) |
Openshift | Redhat | 2.1.2 (including) | 2.1.2 (including) |
Openshift | Redhat | 2.1.3 (including) | 2.1.3 (including) |
Openshift | Redhat | 2.1.4 (including) | 2.1.4 (including) |
Openshift | Redhat | 2.1.5 (including) | 2.1.5 (including) |
Openshift | Redhat | 2.1.6 (including) | 2.1.6 (including) |
Openshift | Redhat | 2.1.7 (including) | 2.1.7 (including) |