Описание
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2013.1~g1-0ubuntu1 |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | ignored | |
| precise | released | 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 |
| quantal | released | 2012.2-0ubuntu1.2 |
| upstream | pending | 2013.1 |
Показывать по
EPSS
3.5 Low
CVSS2
Связанные уязвимости
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properl ...
OpenStack Keystone intended authorization restrictions bypass
EPSS
3.5 Low
CVSS2