Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-12692

Опубликовано: 07 мая 2020
Источник: nvd
CVSS3: 5.4
CVSS2: 5.5
EPSS Низкий

Описание

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
Версия до 15.0.1 (исключая)
cpe:2.3:a:openstack:keystone:16.0.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

EPSS

Процентиль: 34%
0.0014
Низкий

5.4 Medium

CVSS3

5.5 Medium

CVSS2

Дефекты

CWE-294

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

CVSS3: 5.4
redhat
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

CVSS3: 5.4
debian
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 5.4
github
больше 3 лет назад

OpenStack Keystone does not check signature TTL of the EC2 credential auth method

EPSS

Процентиль: 34%
0.0014
Низкий

5.4 Medium

CVSS3

5.5 Medium

CVSS2

Дефекты

CWE-294