An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2017/q2/125 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/98032 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:1461 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2017:1597 | Vendor Advisory |
https://bugs.launchpad.net/keystone/+bug/1677723 | Exploit Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2673 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-07-19 13:29
Updated : 2024-02-28 16:48
NVD link : CVE-2017-2673
Mitre link : CVE-2017-2673
CVE.ORG link : CVE-2017-2673
JSON object : View
Products Affected
redhat
- openstack
CWE
CWE-863
Incorrect Authorization