Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-chgw-36xv-47cw

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

Пакеты

Наименование

keystone

pip
Затронутые версииВерсия исправления

< 15.0.1

15.0.1

Наименование

keystone

pip
Затронутые версииВерсия исправления

= 16.0.0

16.0.1

EPSS

Процентиль: 70%
0.00621
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
redhat
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
nvd
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
debian
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

EPSS

Процентиль: 70%
0.00621
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-269