The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/97237 - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1285.html - | |
References | () http://seclists.org/oss-sec/2013/q3/586 - Patch | |
References | () http://secunia.com/advisories/54706 - | |
References | () http://www.ubuntu.com/usn/USN-2002-1 - | |
References | () https://bugs.launchpad.net/keystone/+bug/1202952 - Vendor Advisory |
Information
Published : 2013-09-23 20:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4294
Mitre link : CVE-2013-4294
CVE.ORG link : CVE-2013-4294
JSON object : View
Products Affected
openstack
- keystone
CWE
CWE-264
Permissions, Privileges, and Access Controls