Red Hat OpenShift Enterprise before 2.2 does not properly restrict access to gears, which allows remote attackers to access the network resources of arbitrary gears via unspecified vectors.
| Software | From | Fixed in |
|---|---|---|
| redhat / openshift | 2.1.2 | 2.1.2.x |
| redhat / openshift | 2.0.6 | 2.0.6.x |
| redhat / openshift | 2.1.5 | 2.1.5.x |
| redhat / openshift | 2.1 | 2.1.x |
| redhat / openshift | 2.0.5 | 2.0.5.x |
| redhat / openshift | 2.0.2 | 2.0.2.x |
| redhat / openshift | 2.1.1 | 2.1.1.x |
| redhat / openshift | 2.0.1 | 2.0.1.x |
| redhat / openshift | - | 2.1.8.x |
| redhat / openshift | 2.1.7 | 2.1.7.x |
| redhat / openshift | 2.1.4 | 2.1.4.x |
| redhat / openshift | 2.0.3 | 2.0.3.x |
| redhat / openshift | 2.1.3 | 2.1.3.x |
| redhat / openshift | 2.0.4 | 2.0.4.x |
| redhat / openshift | 2.1.6 | 2.1.6.x |
| redhat / openshift | 2.0 | 2.0.x |