CVE Vulnerabilities

CVE-2014-5252

Published: Aug 25, 2014 | Modified: Oct 10, 2014
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.9 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:N
RedHat/V2
4.9 LOW
AV:N/AC:M/Au:S/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

Affected Software

Name Vendor Start Version End Version
Keystone Openstack 2014.1 (including) 2014.1 (including)
Keystone Openstack 2014.1.2 (including) 2014.1.2 (including)
Keystone Openstack juno-1 (including) juno-1 (including)
Keystone Openstack juno-2 (including) juno-2 (including)
Ubuntu_linux Canonical 14.04 (including) 14.04 (including)
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 RedHat openstack-keystone-0:2014.1.2.1-2.el6ost *
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 RedHat openstack-keystone-0:2014.1.2.1-1.el7ost *
Keystone Ubuntu trusty *
Keystone Ubuntu upstream *

References