Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gwvq-rgqf-993f

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 2.3
CVSS3: 6

Описание

python-keystoneclient vulnerable to context confusion in Keystone auth_token middleware

A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches "thread" to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.

Пакеты

Наименование

python-keystoneclient

pip
Затронутые версииВерсия исправления

<= 0.6.0

0.7.0

EPSS

Процентиль: 58%
0.00371
Низкий

2.3 Low

CVSS4

6 Medium

CVSS3

Дефекты

CWE-522

Связанные уязвимости

ubuntu
почти 12 лет назад

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

redhat
почти 12 лет назад

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

nvd
почти 12 лет назад

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

debian
почти 12 лет назад

The auth_token middleware in the OpenStack Python client library for K ...

EPSS

Процентиль: 58%
0.00371
Низкий

2.3 Low

CVSS4

6 Medium

CVSS3

Дефекты

CWE-522