CVE-2013-2030

keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:compute:2013.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*
cpe:2.3:a:openstack:grizzly:2013.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html -
References () http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.html - Patch, Vendor Advisory () http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.html - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2013/05/09/2 - () http://www.openwall.com/lists/oss-security/2013/05/09/2 -
References () https://bugs.launchpad.net/nova/+bug/1174608 - () https://bugs.launchpad.net/nova/+bug/1174608 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=958285 - () https://bugzilla.redhat.com/show_bug.cgi?id=958285 -

Information

Published : 2013-12-27 01:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2030

Mitre link : CVE-2013-2030

CVE.ORG link : CVE-2013-2030


JSON object : View

Products Affected

openstack

  • grizzly
  • havana
  • compute
  • folsom
CWE
CWE-264

Permissions, Privileges, and Access Controls