CVE Vulnerabilities

CVE-2020-12692

Authentication Bypass by Capture-replay

Published: May 07, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
5.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:N
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesnt have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

NameVendorStart VersionEnd Version
KeystoneOpenstack*15.0.1 (excluding)
KeystoneOpenstack16.0.0 (including)16.0.0 (including)
Red Hat OpenStack Platform 13.0 (Queens)RedHatopenstack-keystone-1:13.0.4-3.el7ost*
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUSRedHatopenstack-keystone-1:13.0.4-3.el7ost*
Red Hat OpenStack Platform 15.0 (Stein)RedHatopenstack-keystone-1:15.0.1-0.20200512110437.95b2bbe.el8ost*
Red Hat OpenStack Platform 16.0 (Train)RedHatopenstack-keystone-1:16.0.1-0.20200511063421.40cbb7b.el8ost*
KeystoneUbuntubionic*
KeystoneUbuntueoan*
KeystoneUbuntuesm-infra/bionic*
KeystoneUbuntuesm-infra/xenial*
KeystoneUbuntutrusty*
KeystoneUbuntuupstream*
KeystoneUbuntuxenial*

Potential Mitigations

References