CVE-2012-5483

tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading administrative access and secret values from this file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openstack:keystone:2012.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1556.html - () http://rhn.redhat.com/errata/RHSA-2012-1556.html -
References () http://www.securityfocus.com/bid/56888 - () http://www.securityfocus.com/bid/56888 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=873447 - () https://bugzilla.redhat.com/show_bug.cgi?id=873447 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80612 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80612 -

Information

Published : 2012-12-26 22:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5483

Mitre link : CVE-2012-5483

CVE.ORG link : CVE-2012-5483


JSON object : View

Products Affected

openstack

  • keystone
CWE
CWE-264

Permissions, Privileges, and Access Controls