Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12692

Опубликовано: 07 мая 2020
Источник: debian

Описание

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keystonefixed2:17.0.0~rc2-1package
keystoneend-of-lifestretchpackage
keystoneend-of-lifejessiepackage

Примечания

  • https://bugs.launchpad.net/keystone/+bug/1872737

  • https://www.openwall.com/lists/oss-security/2020/05/06/4

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

CVSS3: 5.4
redhat
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

CVSS3: 5.4
nvd
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

CVSS3: 5.4
github
больше 3 лет назад

OpenStack Keystone does not check signature TTL of the EC2 credential auth method