Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8833-qrvm-wc3h

Опубликовано: 05 мая 2022
Источник: github
Github: Прошло ревью

Описание

OpenStack Keystone allows context-dependent attackers to bypass access restrictions

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

Пакеты

Наименование

Keystone

pip
Затронутые версииВерсия исправления

< 8.0.0a0

8.0.0a0

EPSS

Процентиль: 64%
0.00467
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
почти 13 лет назад

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

redhat
почти 13 лет назад

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

nvd
почти 13 лет назад

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

debian
почти 13 лет назад

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, ...

EPSS

Процентиль: 64%
0.00467
Низкий

Дефекты

CWE-287