OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/05/21/3 | Mailing List Patch Third Party Advisory |
https://bugs.launchpad.net/keystone/+bug/1309228 | Exploit Issue Tracking Third Party Advisory |
https://review.openstack.org/#/c/94396/ | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/05/21/3 | Mailing List Patch Third Party Advisory |
https://bugs.launchpad.net/keystone/+bug/1309228 | Exploit Issue Tracking Third Party Advisory |
https://review.openstack.org/#/c/94396/ | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/05/21/3 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugs.launchpad.net/keystone/+bug/1309228 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://review.openstack.org/#/c/94396/ - Patch, Third Party Advisory |
Information
Published : 2014-11-03 23:55
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0204
Mitre link : CVE-2014-0204
CVE.ORG link : CVE-2014-0204
JSON object : View
Products Affected
openstack
- keystone
CWE
CWE-269
Improper Privilege Management