Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qvpr-qm6w-6rcc

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

OpenStack Keystone intended authorization restrictions bypass

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Пакеты

Наименование

Keystone

pip
Затронутые версииВерсия исправления

< 8.0.0a0

8.0.0a0

Наименование

keystone

pip
Затронутые версииВерсия исправления

Отсутствует

EPSS

Процентиль: 39%
0.00173
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

redhat
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

nvd
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

debian
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properl ...

EPSS

Процентиль: 39%
0.00173
Низкий