Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19687

Опубликовано: 04 дек. 2019
Источник: redhat
CVSS3: 8.1

Описание

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)

A disclosure vulnerability was found in openstack-keystone's credentials API. Users with a project role are able to list any credentials with the /v3/credentials API when enforce_scope is false. Information for time-based one time passwords (TOTP) may also be disclosed. Deployments running keystone with enforce_scope set to false are also affected. There will be a slight performance impact for the list credentials API once this issue is fixed.

Меры по смягчению последствий

To mitigate this issue, set the [oslo_policy] enforce_scope option to 'true' in the keystone.conf file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Fuse 6jclouds_openstack-keystone_apiNot affected
Red Hat OpenStack Platform 15.0 (Stein)openstack-keystoneFixedRHSA-2019:435819.12.2019
Red Hat OpenStack Platform 16.0 (Train)openstack-keystoneFixedRHEA-2020:028306.02.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1781470openstack-keystone: Credentials API allows non-admin to list and retrieve all users credentials

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)

CVSS3: 8.8
nvd
около 6 лет назад

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)

CVSS3: 8.8
debian
около 6 лет назад

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in th ...

CVSS3: 8.8
github
больше 3 лет назад

OpenStack Keystone Credential Leakage

8.1 High

CVSS3