swift@1.0.2 vulnerabilities

OpenStack Object Storage

Direct Vulnerabilities

Known vulnerabilities in the swift package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

swift is an OpenStack Object Storage

Affected versions of this package are vulnerable to Denial of Service (DoS) due to not properly closing connections between client and proxy. An attacker can consume excessive resources by sending interrupted requests to a Large Object URL.

How to fix Denial of Service (DoS)?

Upgrade swift to version 2.15.2 or higher.

[,2.15.2)
  • M
Denial of Service (DoS)

swift is an OpenStack Object Storage

Affected versions of this package are vulnerable to Denial of Service (DoS) due to not properly closing connections between proxy and server. An attacker can consume excessive resources by sending interrupted requests to a Large Object URL.

How to fix Denial of Service (DoS)?

Upgrade swift to version 2.15.2 or higher.

[,2.15.2)
  • C
Deserialization of Untrusted Data

swift is an OpenStack Object Storage

Affected versions of this package are vulnerable to Deserialization of Untrusted Data in its use of the Pickle loads() function to load memcached data.

How to fix Deserialization of Untrusted Data?

Upgrade swift to version 2.15.2 or higher.

[,2.15.2)
  • M
Cross-site Scripting (XSS)

swift is an OpenStack Object Storage

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, by allowing remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.

How to fix Cross-site Scripting (XSS)?

Upgrade swift to version 2.15.2 or higher.

[,2.15.2)
  • M
Information Exposure

swift is an OpenStack Object Storage

Affected versions of this package are vulnerable to Information Exposure. The proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.

How to fix Information Exposure?

Upgrade swift to version 2.15.2 or higher.

[,2.15.2)