CVE Vulnerabilities

CVE-2020-12692

Authentication Bypass by Capture-replay

Published: May 07, 2020 | Modified: Apr 27, 2022
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
5.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesnt have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

Name Vendor Start Version End Version
Keystone Openstack * *
Keystone Openstack 16.0.0 16.0.0

Potential Mitigations

References