Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-3683

Опубликовано: 17 янв. 2020
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:suse:openstack_cloud:8.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:suse:keystone-json-assignment:*:*:*:*:*:*:*:*
Версия до 2019-02-18 (исключая)
Конфигурация 3
cpe:2.3:a:hp:helion_openstack:8.0:*:*:*:*:*:*:*

EPSS

Процентиль: 50%
0.00272
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-732
CWE-732

Связанные уязвимости

github
больше 3 лет назад

The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.

EPSS

Процентиль: 50%
0.00272
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-732
CWE-732