Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5571

Опубликовано: 18 дек. 2012
Источник: debian
EPSS Низкий

Описание

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonefixed2012.1.1-11package

EPSS

Процентиль: 39%
0.00173
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

redhat
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

nvd
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

github
больше 3 лет назад

OpenStack Keystone intended authorization restrictions bypass

EPSS

Процентиль: 39%
0.00173
Низкий