CVE-2014-9245

Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zenoss:zenoss_core:*:beta_3:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:5.0.0:beta_1:*:*:*:*:*:*
cpe:2.3:a:zenoss:zenoss_core:5.0.0:beta_2:*:*:*:*:*:*

History

No history.

Information

Published : 2014-12-15 18:59

Updated : 2024-02-04 18:35


NVD link : CVE-2014-9245

Mitre link : CVE-2014-9245

CVE.ORG link : CVE-2014-9245


JSON object : View

Products Affected

zenoss

  • zenoss_core
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor