CVE-2012-3426

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.
References
Link Resource
http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa
http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355 Patch
http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626 Exploit Patch
http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d
http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454
http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de Exploit Patch
http://secunia.com/advisories/50045
http://secunia.com/advisories/50494
http://www.openwall.com/lists/oss-security/2012/07/27/4 Patch
http://www.ubuntu.com/usn/USN-1552-1
https://bugs.launchpad.net/keystone/+bug/996595
https://bugs.launchpad.net/keystone/+bug/997194
https://bugs.launchpad.net/keystone/+bug/998185
https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz Patch
http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa
http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355 Patch
http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626 Exploit Patch
http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d
http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454
http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de Exploit Patch
http://secunia.com/advisories/50045
http://secunia.com/advisories/50494
http://www.openwall.com/lists/oss-security/2012/07/27/4 Patch
http://www.ubuntu.com/usn/USN-1552-1
https://bugs.launchpad.net/keystone/+bug/996595
https://bugs.launchpad.net/keystone/+bug/997194
https://bugs.launchpad.net/keystone/+bug/998185
https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:essex:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:horizon:folsom-1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2012.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2012.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa - () http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa -
References () http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355 - Patch () http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355 - Patch
References () http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626 - Exploit, Patch () http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626 - Exploit, Patch
References () http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d - () http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d -
References () http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454 - () http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454 -
References () http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de - Exploit, Patch () http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de - Exploit, Patch
References () http://secunia.com/advisories/50045 - () http://secunia.com/advisories/50045 -
References () http://secunia.com/advisories/50494 - () http://secunia.com/advisories/50494 -
References () http://www.openwall.com/lists/oss-security/2012/07/27/4 - Patch () http://www.openwall.com/lists/oss-security/2012/07/27/4 - Patch
References () http://www.ubuntu.com/usn/USN-1552-1 - () http://www.ubuntu.com/usn/USN-1552-1 -
References () https://bugs.launchpad.net/keystone/+bug/996595 - () https://bugs.launchpad.net/keystone/+bug/996595 -
References () https://bugs.launchpad.net/keystone/+bug/997194 - () https://bugs.launchpad.net/keystone/+bug/997194 -
References () https://bugs.launchpad.net/keystone/+bug/998185 - () https://bugs.launchpad.net/keystone/+bug/998185 -
References () https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz - Patch () https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz - Patch

Information

Published : 2012-07-31 10:45

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3426

Mitre link : CVE-2012-3426

CVE.ORG link : CVE-2012-3426


JSON object : View

Products Affected

openstack

  • keystone
  • horizon
  • essex
CWE
CWE-264

Permissions, Privileges, and Access Controls