Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3520

Опубликовано: 02 июл. 2014
Источник: redhat
CVSS2: 3.5
EPSS Низкий

Описание

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.

A flaw was found in the way keystone handled trusts. A trustee could use an out-of-scope project ID to gain unauthorized access to a project if the trustor had the required roles for that requested project.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)openstack-keystoneAffected
OpenStack 3 for RHEL 6openstack-keystoneFixedRHSA-2014:099431.07.2014
OpenStack 4 for RHEL 6openstack-keystoneFixedRHSA-2014:099431.07.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1112668openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id

EPSS

Процентиль: 62%
0.00428
Низкий

3.5 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.

nvd
больше 11 лет назад

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.

debian
больше 11 лет назад

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, ...

github
больше 3 лет назад

OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.

EPSS

Процентиль: 62%
0.00428
Низкий

3.5 Low

CVSS2