OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa - | |
References | () http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355 - Patch | |
References | () http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626 - Exploit, Patch | |
References | () http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d - | |
References | () http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454 - | |
References | () http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de - Exploit, Patch | |
References | () http://secunia.com/advisories/50045 - | |
References | () http://secunia.com/advisories/50494 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/27/4 - Patch | |
References | () http://www.ubuntu.com/usn/USN-1552-1 - | |
References | () https://bugs.launchpad.net/keystone/+bug/996595 - | |
References | () https://bugs.launchpad.net/keystone/+bug/997194 - | |
References | () https://bugs.launchpad.net/keystone/+bug/998185 - | |
References | () https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz - Patch |
Information
Published : 2012-07-31 10:45
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3426
Mitre link : CVE-2012-3426
CVE.ORG link : CVE-2012-3426
JSON object : View
Products Affected
openstack
- keystone
- horizon
- essex
CWE
CWE-264
Permissions, Privileges, and Access Controls