OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
References
Configurations
History
21 Nov 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2012-1557.html - | |
References | () http://secunia.com/advisories/51423 - Vendor Advisory | |
References | () http://secunia.com/advisories/51436 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/11/28/5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2012/11/28/6 - Patch | |
References | () http://www.securityfocus.com/bid/56727 - | |
References | () http://www.ubuntu.com/usn/USN-1641-1 - | |
References | () https://bugs.launchpad.net/keystone/+bug/1079216 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/80370 - | |
References | () https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5 - | |
References | () https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681 - |
07 Nov 2023, 02:12
Type | Values Removed | Values Added |
---|---|---|
Summary | OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. |
Information
Published : 2012-12-18 01:55
Updated : 2024-11-21 01:44
NVD link : CVE-2012-5563
Mitre link : CVE-2012-5563
CVE.ORG link : CVE-2012-5563
JSON object : View
Products Affected
openstack
- folsom
CWE
CWE-255
Credentials Management Errors