Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5563

Опубликовано: 18 дек. 2012
Источник: debian
EPSS Низкий

Описание

OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonenot-affectedpackage

EPSS

Процентиль: 64%
0.00467
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

redhat
около 13 лет назад

OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

nvd
около 13 лет назад

OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

CVSS3: 5.9
github
больше 3 лет назад

OpenStack Keystone Insufficient token expiration

EPSS

Процентиль: 64%
0.00467
Низкий