CVE-2014-3476

OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html Mailing List Third Party Advisory
http://secunia.com/advisories/57886 Third Party Advisory
http://secunia.com/advisories/59547 Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/06/12/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68026 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1324592 Exploit Issue Tracking Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html Mailing List Third Party Advisory
http://secunia.com/advisories/57886 Third Party Advisory
http://secunia.com/advisories/59547 Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/06/12/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68026 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1324592 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:suse:cloud:3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/57886 - Third Party Advisory () http://secunia.com/advisories/57886 - Third Party Advisory
References () http://secunia.com/advisories/59547 - Third Party Advisory () http://secunia.com/advisories/59547 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/06/12/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/06/12/3 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/68026 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/68026 - Third Party Advisory, VDB Entry
References () https://bugs.launchpad.net/keystone/+bug/1324592 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1324592 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2014-06-17 14:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3476

Mitre link : CVE-2014-3476

CVE.ORG link : CVE-2014-3476


JSON object : View

Products Affected

openstack

  • keystone

suse

  • cloud
CWE
CWE-269

Improper Privilege Management