Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12690

Опубликовано: 06 мая 2020
Источник: redhat
CVSS3: 8.8

Описание

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

A flaw was found in Keystone, where it inadvertently provided OAuth1 access tokens to every role assignment the creator had for a project, resulting in giving more permissions and escalated access in role assignments than intended. The greatest impact is on confidentiality.

Отчет

Red Hat Quay includes keystone-client, which is not vulnerable to this (server-side) vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)openstack-keystoneOut of support scope
Red Hat JBoss Fuse 6openstack-keystoneNot affected
Red Hat OpenStack Platform 10 (Newton)openstack-keystoneAffected
Red Hat OpenStack Platform 13 (Queens)openstack-keystoneAffected
Red Hat Quay 3quay/quay-rhel8Not affected
Red Hat OpenStack Platform 15.0 (Stein)openstack-keystoneFixedRHSA-2020:310222.07.2020
Red Hat OpenStack Platform 16.0 (Train)openstack-keystoneFixedRHSA-2020:310522.07.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1830395openstack-keystone: OAuth1 request token authorize silently ignores roles parameter

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
nvd
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
debian
почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
github
больше 4 лет назад

Insufficient Session Expiration in OpenStack Keystone

8.8 High

CVSS3