The odl-mdsal-apidocs feature in OpenDaylight Helium allow remote attackers to obtain sensitive information by leveraging missing AAA restrictions.
References
| Link | Resource |
|---|---|
| https://cloudrouter.org/security/ | Broken Link |
| https://git.opendaylight.org/gerrit/#/c/17709/ | Patch Vendor Advisory |
| https://wiki.opendaylight.org/view/Security_Advisories | Patch Vendor Advisory |
| https://cloudrouter.org/security/ | Broken Link |
| https://git.opendaylight.org/gerrit/#/c/17709/ | Patch Vendor Advisory |
| https://wiki.opendaylight.org/view/Security_Advisories | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 02:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cloudrouter.org/security/ - Broken Link | |
| References | () https://git.opendaylight.org/gerrit/#/c/17709/ - Patch, Vendor Advisory | |
| References | () https://wiki.opendaylight.org/view/Security_Advisories - Patch, Vendor Advisory |
Information
Published : 2018-04-27 16:29
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1857
Mitre link : CVE-2015-1857
CVE.ORG link : CVE-2015-1857
JSON object : View
Products Affected
linuxfoundation
- opendaylight
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
