CVE-2021-3563

A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2021-3563 Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ossa/+bug/1901891 Exploit Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1962908 Exploit Issue Tracking Third Party Advisory Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html
https://security-tracker.debian.org/tracker/CVE-2021-3563 Exploit Issue Tracking Third Party Advisory
https://access.redhat.com/security/cve/CVE-2021-3563 Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ossa/+bug/1901891 Exploit Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1962908 Exploit Issue Tracking Third Party Advisory Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html
https://security-tracker.debian.org/tracker/CVE-2021-3563 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*

History

21 Nov 2024, 06:21

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2021-3563 - Issue Tracking, Third Party Advisory () https://access.redhat.com/security/cve/CVE-2021-3563 - Issue Tracking, Third Party Advisory
References () https://bugs.launchpad.net/ossa/+bug/1901891 - Exploit, Issue Tracking, Third Party Advisory, VDB Entry () https://bugs.launchpad.net/ossa/+bug/1901891 - Exploit, Issue Tracking, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1962908 - Exploit, Issue Tracking, Third Party Advisory, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1962908 - Exploit, Issue Tracking, Third Party Advisory, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html -
References () https://security-tracker.debian.org/tracker/CVE-2021-3563 - Exploit, Issue Tracking, Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2021-3563 - Exploit, Issue Tracking, Third Party Advisory

21 Jan 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html -

Information

Published : 2022-08-26 16:15

Updated : 2024-11-21 06:21


NVD link : CVE-2021-3563

Mitre link : CVE-2021-3563

CVE.ORG link : CVE-2021-3563


JSON object : View

Products Affected

openstack

  • keystone

redhat

  • openstack_platform

debian

  • debian_linux
CWE
CWE-863

Incorrect Authorization