The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from a trust-scoped token and using them in an ec2tokens API request.
References
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2014-0089.html - Third Party Advisory | |
References | () http://secunia.com/advisories/56079 - Third Party Advisory | |
References | () http://secunia.com/advisories/56154 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/12/11/7 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/64253 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2061-1 - Third Party Advisory | |
References | () https://bugs.launchpad.net/keystone/+bug/1242597 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/89657 - Third Party Advisory, VDB Entry |
Information
Published : 2013-12-14 17:21
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6391
Mitre link : CVE-2013-6391
CVE.ORG link : CVE-2013-6391
JSON object : View
Products Affected
redhat
- openstack
openstack
- keystone
canonical
- ubuntu_linux
CWE
CWE-269
Improper Privilege Management