Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1852

Опубликовано: 17 апр. 2015
Источник: debian
EPSS Низкий

Описание

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-keystonemiddlewarefixed1.5.0-2package
python-keystonemiddlewarefixed1.0.0-3+deb8u1jessiepackage
python-keystoneclientfixed1:1.3.0-2package
python-keystoneclientfixed1:0.10.1-2+deb8u1jessiepackage
python-keystoneclientnot-affectedwheezypackage

Примечания

  • originally fixed in 1:0.10.1-3 but then 1:1.3.0-1 was uploaded without the fix

  • https://launchpad.net/bugs/1411063

EPSS

Процентиль: 44%
0.00219
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

redhat
почти 11 лет назад

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

nvd
почти 11 лет назад

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

suse-cvrf
больше 10 лет назад

Security update for python modules

suse-cvrf
больше 10 лет назад

Security update for python-keystoneclient

EPSS

Процентиль: 44%
0.00219
Низкий