The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
References
Configurations
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1677.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1685.html - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - | |
References | () http://www.securityfocus.com/bid/74187 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2705-1 - Third Party Advisory | |
References | () https://bugs.launchpad.net/keystonemiddleware/+bug/1411063 - |
Information
Published : 2015-04-17 17:59
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1852
Mitre link : CVE-2015-1852
CVE.ORG link : CVE-2015-1852
JSON object : View
Products Affected
canonical
- ubuntu_linux
openstack
- keystonemiddleware
- python-keystoneclient
CWE
CWE-17
DEPRECATED: Code