Описание
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:2014.2~b2-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:2014.1.2.1-0ubuntu1]] |
| lucid | DNE | |
| precise | not-affected | code not present |
| saucy | ignored | end of life |
| trusty | released | 1:2014.1.2.1-0ubuntu1 |
| trusty/esm | DNE | trusty was released [1:2014.1.2.1-0ubuntu1] |
| upstream | released | 2014.1.1-2,2014.1.2 |
Показывать по
6 Medium
CVSS2
Связанные уязвимости
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, ...
OpenStack Identity Keystone is vulnerable to Block delegation escalation of privilege
6 Medium
CVSS2