Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12689

Опубликовано: 07 мая 2020
Источник: debian

Описание

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonefixed2:17.0.0~rc2-1package
keystoneend-of-lifestretchpackage
keystoneend-of-lifejessiepackage

Примечания

  • https://bugs.launchpad.net/keystone/+bug/1872735

  • https://www.openwall.com/lists/oss-security/2020/05/06/5

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
redhat
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
nvd
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
github
больше 3 лет назад

OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context