CVE-2015-1852

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystonemiddleware:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-04-17 17:59

Updated : 2024-02-28 12:20


NVD link : CVE-2015-1852

Mitre link : CVE-2015-1852

CVE.ORG link : CVE-2015-1852


JSON object : View

Products Affected

canonical

  • ubuntu_linux

openstack

  • keystonemiddleware
  • python-keystoneclient
CWE
CWE-17

DEPRECATED: Code