Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-5252

Опубликовано: 25 авг. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4.9

Описание

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

РелизСтатусПримечание
devel

not-affected

1:2014.2~b3-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:2014.1.2.1-0ubuntu1.1]]
lucid

DNE

precise

not-affected

trusty

released

1:2014.1.2.1-0ubuntu1.1
trusty/esm

DNE

trusty was released [1:2014.1.2.1-0ubuntu1.1]
upstream

released

2014.1.2.1-1

Показывать по

4.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

nvd
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

debian
больше 11 лет назад

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 ...

CVSS3: 6.5
github
больше 3 лет назад

OpenStack Identity (Keystone) UUID v2 tokens does not expire with revocation events

4.9 Medium

CVSS2