The odl-mdsal-apidocs feature in OpenDaylight Helium allow remote attackers to obtain sensitive information by leveraging missing AAA restrictions.
References
Link | Resource |
---|---|
https://cloudrouter.org/security/ | Broken Link |
https://git.opendaylight.org/gerrit/#/c/17709/ | Patch Vendor Advisory |
https://wiki.opendaylight.org/view/Security_Advisories | Patch Vendor Advisory |
https://cloudrouter.org/security/ | Broken Link |
https://git.opendaylight.org/gerrit/#/c/17709/ | Patch Vendor Advisory |
https://wiki.opendaylight.org/view/Security_Advisories | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://cloudrouter.org/security/ - Broken Link | |
References | () https://git.opendaylight.org/gerrit/#/c/17709/ - Patch, Vendor Advisory | |
References | () https://wiki.opendaylight.org/view/Security_Advisories - Patch, Vendor Advisory |
16 Jun 2021, 13:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:linuxfoundation:opendaylight:*:*:*:*:*:*:*:* |
Information
Published : 2018-04-27 16:29
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1857
Mitre link : CVE-2015-1857
CVE.ORG link : CVE-2015-1857
JSON object : View
Products Affected
linuxfoundation
- opendaylight
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor