The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the insecure option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keystonemiddleware | Openstack | * | 1.5.0 (including) |
Python-keystoneclient | Openstack | * | 1.3.0 (including) |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 | RedHat | python-keystoneclient-1:0.9.0-6.el6ost | * |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 | RedHat | python-keystoneclient-1:0.9.0-6.el7ost | * |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | RedHat | python-keystoneclient-1:0.11.1-2.el7ost | * |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | RedHat | python-keystonemiddleware-0:1.3.2-1.el7ost | * |
Python-keystoneclient | Ubuntu | trusty | * |
Python-keystoneclient | Ubuntu | utopic | * |
Python-keystoneclient | Ubuntu | vivid | * |
Python-keystonemiddleware | Ubuntu | utopic | * |
Python-keystonemiddleware | Ubuntu | vivid | * |