CVE-2014-3520

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://lists.openstack.org/pipermail/openstack-announce/2014-July/000248.html - Patch, Vendor Advisory () http://lists.openstack.org/pipermail/openstack-announce/2014-July/000248.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/59426 - Third Party Advisory () http://secunia.com/advisories/59426 - Third Party Advisory
References () https://bugs.launchpad.net/keystone/+bug/1331912 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1331912 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2014-10-26 20:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3520

Mitre link : CVE-2014-3520

CVE.ORG link : CVE-2014-3520


JSON object : View

Products Affected

openstack

  • keystone
CWE
CWE-863

Incorrect Authorization