Описание
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1:2014.2~rc1-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:2014.1.3-0ubuntu2.1]] |
| esm-infra/xenial | released | 1:2014.2~rc1-0ubuntu1 |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 1:2014.1.3-0ubuntu2.1 |
| trusty/esm | DNE | trusty was released [1:2014.1.3-0ubuntu2.1] |
| upstream | released | 2013.2.3, 2014.1.2.1 |
| utopic | released | 1:2014.2~rc1-0ubuntu1 |
Показывать по
4 Medium
CVSS2
Связанные уязвимости
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
The catalog url replacement in OpenStack Identity (Keystone) before 20 ...
OpenStack Identity Keystone Exposure of Sensitive Information
4 Medium
CVSS2