Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-5571

Опубликовано: 28 нояб. 2012
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 2.0openstack-keystoneAffected
OpenStack Essex for RHEL 6openstack-keystoneFixedRHSA-2012:155610.12.2012
OpenStack Folsom for RHEL 6openstack-keystoneFixedRHSA-2012:155710.12.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=880399OpenStack: Keystone EC2-style credentials invalidation issue

EPSS

Процентиль: 39%
0.00173
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

nvd
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

debian
около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properl ...

github
больше 3 лет назад

OpenStack Keystone intended authorization restrictions bypass

EPSS

Процентиль: 39%
0.00173
Низкий

4 Medium

CVSS2