Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3621

Опубликовано: 02 окт. 2014
Источник: debian
EPSS Низкий

Описание

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonefixed2014.1.3-1package
keystonenot-affectedwheezypackage

Примечания

  • up to 2013.2.3 and 2014.1 versions up to 2014.1.2.1

EPSS

Процентиль: 62%
0.00426
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

redhat
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

nvd
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

github
больше 3 лет назад

OpenStack Identity Keystone Exposure of Sensitive Information

EPSS

Процентиль: 62%
0.00426
Низкий