Логотип exploitDog
bind:CVE-2012-5571
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-5571

Количество 5

Количество 5

ubuntu логотип

CVE-2012-5571

около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 3.5
EPSS: Низкий
redhat логотип

CVE-2012-5571

около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2012-5571

около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 3.5
EPSS: Низкий
debian логотип

CVE-2012-5571

около 13 лет назад

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properl ...

CVSS2: 3.5
EPSS: Низкий
github логотип

GHSA-qvpr-qm6w-6rcc

больше 3 лет назад

OpenStack Keystone intended authorization restrictions bypass

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2012-5571

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 3.5
0%
Низкий
около 13 лет назад
redhat логотип
CVE-2012-5571

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 4
0%
Низкий
около 13 лет назад
nvd логотип
CVE-2012-5571

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

CVSS2: 3.5
0%
Низкий
около 13 лет назад
debian логотип
CVE-2012-5571

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properl ...

CVSS2: 3.5
0%
Низкий
около 13 лет назад
github логотип
GHSA-qvpr-qm6w-6rcc

OpenStack Keystone intended authorization restrictions bypass

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу