Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-5252

Опубликовано: 25 авг. 2014
Источник: debian
EPSS Низкий

Описание

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonefixed2014.1.2.1-1package
keystonenot-affectedwheezypackage

Примечания

  • https://launchpad.net/bugs/1348820

  • https://git.openstack.org/cgit/openstack/keystone/commit/?id=bdb88c662ac2035f9b0d8a229a5db5f60f5f16ae

EPSS

Процентиль: 52%
0.00287
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

redhat
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

nvd
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

CVSS3: 6.5
github
больше 3 лет назад

OpenStack Identity (Keystone) UUID v2 tokens does not expire with revocation events

EPSS

Процентиль: 52%
0.00287
Низкий