Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5qpp-v56f-mqfm

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

OpenStack Identity (Keystone) allows remote attackers to bypass intended access restrictions via revoked PKI token

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.

Пакеты

Наименование

keystone

pip
Затронутые версииВерсия исправления

>= 2012.2.0, < 2013.1.4

2013.1.4

EPSS

Процентиль: 74%
0.008
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Связанные уязвимости

ubuntu
больше 12 лет назад

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.

redhat
больше 12 лет назад

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.

nvd
больше 12 лет назад

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.

debian
больше 12 лет назад

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Key ...

EPSS

Процентиль: 74%
0.008
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3