CVE-2022-2447

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2022-2447 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2105419 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openstack:keystone:-:*:*:*:*:*:*:*
OR cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-09-01 21:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-2447

Mitre link : CVE-2022-2447

CVE.ORG link : CVE-2022-2447


JSON object : View

Products Affected

redhat

  • openstack_platform
  • openstack
  • quay
  • storage

openstack

  • keystone
CWE
CWE-672

Operation on a Resource after Expiration or Release

CWE-324

Use of a Key Past its Expiration Date