Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12689

Опубликовано: 06 мая 2020
Источник: redhat
CVSS3: 8.8

Описание

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

A vulnerability was found in Keystone's EC2 credentials API. This flaw allows any user authenticated within a limited scope (trust/OAuth/application credential) to create an EC2 credential with escalated permissions, for example, obtaining an "admin" role, while the user is on a limited "viewer" role.

Отчет

Red Hat Quay includes keystone-client, which is not vulnerable to this (server-side) vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)openstack-keystoneOut of support scope
Red Hat JBoss Fuse 6openstack-keystoneNot affected
Red Hat Quay 3quay/quay-rhel8Not affected
Red Hat OpenStack Platform 10.0 (Newton)openstack-keystoneFixedRHSA-2020:309622.07.2020
Red Hat OpenStack Platform 13.0 (Queens)openstack-keystoneFixedRHSA-2020:273224.06.2020
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUSopenstack-keystoneFixedRHSA-2020:273224.06.2020
Red Hat OpenStack Platform 15.0 (Stein)openstack-keystoneFixedRHSA-2020:310222.07.2020
Red Hat OpenStack Platform 16.0 (Train)openstack-keystoneFixedRHSA-2020:310522.07.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1830396openstack-keystone: EC2 and credential endpoints are not protected from a scoped context

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
nvd
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
debian
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
github
больше 3 лет назад

OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context

8.8 High

CVSS3