Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14432

Опубликовано: 25 июл. 2018
Источник: redhat
CVSS3: 5.3

Описание

In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.

A flaw was found in Keystone federation. By doing GET /v3/OS-FEDERATION/projects an authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.

Отчет

Red Hat Quay does not include the vulnerable keystone/federation/controllers.py file fixed in [1] [1] https://review.opendev.org/c/openstack/keystone/+/585782/

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)openstack-keystoneNot affected
Red Hat Fuse 7openstack-keystoneNot affected
Red Hat JBoss Fuse 6openstack-keystoneNot affected
Red Hat OpenStack Platform 14 (Rocky)openstack-keystoneNot affected
Red Hat OpenStack Platform 8 (Liberty)openstack-keystoneNot affected
Red Hat OpenStack Platform 9 (Mitaka)openstack-keystoneNot affected
Red Hat Quay 3quay/quay-rhel8Not affected
Red Hat OpenStack Platform 10.0 (Newton)openstack-keystoneFixedRHSA-2018:254322.08.2018
Red Hat OpenStack Platform 12.0 (Pike)openstack-keystoneFixedRHSA-2018:252320.08.2018
Red Hat OpenStack Platform 13.0 (Queens)openstack-keystoneFixedRHSA-2018:253321.08.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1606868openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.

CVSS3: 5.3
nvd
больше 7 лет назад

In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.

CVSS3: 5.3
debian
больше 7 лет назад

In the Federation component of OpenStack Keystone before 11.0.4, 12.0. ...

CVSS3: 5.3
github
больше 3 лет назад

In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.

5.3 Medium

CVSS3