Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-22797

Опубликовано: 19 янв. 2026
Источник: redhat
CVSS3: 9.9
EPSS Низкий

Описание

An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The external_oauth2_token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the external_oauth2_token middleware are affected.

A flaw was found in OpenStack keystonemiddleware. The external_oauth2_token middleware fails to properly sanitize incoming authentication headers. An authenticated attacker can exploit this by sending forged identity headers, such as X-Is-Admin-Project, X-Roles, or X-User-Id. This can lead to privilege escalation or impersonation of other users within the system.

Отчет

This is an IMPORTANT privilege escalation flaw in OpenStack keystonemiddleware. The external_oauth2_token middleware does not correctly sanitize incoming authentication headers. An authenticated attacker can exploit this by sending forged identity headers, such as X-Is-Admin-Project, X-Roles, or X-User-Id, to escalate privileges or impersonate other users. All Red Hat OpenStack Platform deployments utilizing the external_oauth2_token middleware are affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-aodh-apiNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-aodh-baseNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-aodh-evaluatorNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-aodh-listenerNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-aodh-notifierNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-barbican-apiNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-barbican-baseNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-barbican-keystone-listenerNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-barbican-workerNot affected
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-ceilometer-baseNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=2430879keystonemiddleware: OpenStack keystonemiddleware: Privilege escalation and user impersonation via forged authentication headers

EPSS

Процентиль: 35%
0.00143
Низкий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.9
ubuntu
2 месяца назад

An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The external_oauth2_token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the external_oauth2_token middleware are affected.

CVSS3: 9.9
nvd
2 месяца назад

An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The external_oauth2_token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the external_oauth2_token middleware are affected.

CVSS3: 9.9
debian
2 месяца назад

An issue was discovered in OpenStack keystonemiddleware 10.5 through 1 ...

CVSS3: 9.9
github
2 месяца назад

An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The external_oauth2_token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the external_oauth2_token middleware are affected.

EPSS

Процентиль: 35%
0.00143
Низкий

9.9 Critical

CVSS3