CVE-2012-3542

OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:horizon:folsom-3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:41

Type Values Removed Values Added
References () http://secunia.com/advisories/50467 - Vendor Advisory () http://secunia.com/advisories/50467 - Vendor Advisory
References () http://secunia.com/advisories/50494 - Vendor Advisory () http://secunia.com/advisories/50494 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/08/30/6 - () http://www.openwall.com/lists/oss-security/2012/08/30/6 -
References () http://www.securityfocus.com/bid/55326 - () http://www.securityfocus.com/bid/55326 -
References () http://www.ubuntu.com/usn/USN-1552-1 - () http://www.ubuntu.com/usn/USN-1552-1 -
References () https://bugs.launchpad.net/keystone/+bug/1040626 - () https://bugs.launchpad.net/keystone/+bug/1040626 -
References () https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155 - Patch () https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155 - Patch
References () https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa - Patch () https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa - Patch
References () https://lists.launchpad.net/openstack/msg16282.html - () https://lists.launchpad.net/openstack/msg16282.html -

07 Nov 2023, 02:11

Type Values Removed Values Added
Summary OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540. OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.

Information

Published : 2012-09-05 23:55

Updated : 2024-11-21 01:41


NVD link : CVE-2012-3542

Mitre link : CVE-2012-3542

CVE.ORG link : CVE-2012-3542


JSON object : View

Products Affected

openstack

  • horizon
  • essex
CWE
CWE-264

Permissions, Privileges, and Access Controls