Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3621

Опубликовано: 16 сент. 2014
Источник: redhat
CVSS2: 3.6
EPSS Низкий

Описание

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

A flaw was found in the keystone catalog URL replacement. A user with permissions to register an endpoint could use this flaw to leak configuration data, including the master admin_token. Only keystone setups that allow non-cloud-admin users to create endpoints were affected by this issue.

Дополнительная информация

Статус:

Important
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1139937openstack-keystone: configuration data information leak through Keystone catalog

EPSS

Процентиль: 62%
0.00426
Низкий

3.6 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

nvd
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

debian
больше 11 лет назад

The catalog url replacement in OpenStack Identity (Keystone) before 20 ...

github
больше 3 лет назад

OpenStack Identity Keystone Exposure of Sensitive Information

EPSS

Процентиль: 62%
0.00426
Низкий

3.6 Low

CVSS2