CVE-2012-4456

The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
References
Link Resource
http://secunia.com/advisories/50665 Third Party Advisory Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/09/28/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/55716 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1006815 Third Party Advisory
https://bugs.launchpad.net/keystone/+bug/1006822 Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=861179 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/78944 Third Party Advisory VDB Entry
https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1 Third Party Advisory
https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb Third Party Advisory
https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431 Third Party Advisory
https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb Third Party Advisory
https://lists.launchpad.net/openstack/msg17034.html Patch Third Party Advisory
http://secunia.com/advisories/50665 Third Party Advisory Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/09/28/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/55716 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1006815 Third Party Advisory
https://bugs.launchpad.net/keystone/+bug/1006822 Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=861179 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/78944 Third Party Advisory VDB Entry
https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1 Third Party Advisory
https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb Third Party Advisory
https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431 Third Party Advisory
https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb Third Party Advisory
https://lists.launchpad.net/openstack/msg17034.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*

History

21 Nov 2024, 01:42

Type Values Removed Values Added
References () http://secunia.com/advisories/50665 - Third Party Advisory, Vendor Advisory () http://secunia.com/advisories/50665 - Third Party Advisory, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/09/28/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/09/28/5 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/55716 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/55716 - Third Party Advisory, VDB Entry
References () https://bugs.launchpad.net/keystone/+bug/1006815 - Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1006815 - Third Party Advisory
References () https://bugs.launchpad.net/keystone/+bug/1006822 - Patch, Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1006822 - Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=861179 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=861179 - Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/78944 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/78944 - Third Party Advisory, VDB Entry
References () https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1 - Third Party Advisory () https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1 - Third Party Advisory
References () https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb - Third Party Advisory () https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb - Third Party Advisory
References () https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431 - Third Party Advisory () https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431 - Third Party Advisory
References () https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb - Third Party Advisory () https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb - Third Party Advisory
References () https://lists.launchpad.net/openstack/msg17034.html - Patch, Third Party Advisory () https://lists.launchpad.net/openstack/msg17034.html - Patch, Third Party Advisory

Information

Published : 2012-10-09 15:55

Updated : 2024-11-21 01:42


NVD link : CVE-2012-4456

Mitre link : CVE-2012-4456

CVE.ORG link : CVE-2012-4456


JSON object : View

Products Affected

openstack

  • keystone
CWE
CWE-287

Improper Authentication