python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-06/msg00198.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0944.html - | |
References | () http://www.openwall.com/lists/oss-security/2013/05/28/7 - | |
References | () http://www.ubuntu.com/usn/USN-1851-1 - | |
References | () http://www.ubuntu.com/usn/USN-1875-1 - | |
References | () https://bugs.launchpad.net/python-keystoneclient/+bug/1179615 - |
Information
Published : 2014-01-21 18:55
Updated : 2024-11-21 01:51
NVD link : CVE-2013-2104
Mitre link : CVE-2013-2104
CVE.ORG link : CVE-2013-2104
JSON object : View
Products Affected
openstack
- python-keystoneclient
CWE
CWE-264
Permissions, Privileges, and Access Controls