The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2014-1121.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1122.html - | |
References | () http://www.openwall.com/lists/oss-security/2014/08/15/6 - | |
References | () http://www.ubuntu.com/usn/USN-2324-1 - | |
References | () https://bugs.launchpad.net/keystone/+bug/1348820 - |
Information
Published : 2014-08-25 14:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5252
Mitre link : CVE-2014-5252
CVE.ORG link : CVE-2014-5252
JSON object : View
Products Affected
openstack
- keystone
canonical
- ubuntu_linux
CWE
CWE-255
Credentials Management Errors