Логотип exploitDog
bind:CVE-2020-12689
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-12689

Количество 5

Количество 5

ubuntu логотип

CVE-2020-12689

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2020-12689

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2020-12689

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-12689

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-chgw-36xv-47cw

больше 3 лет назад

OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-12689

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-12689

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-12689

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-12689

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
github логотип
GHSA-chgw-36xv-47cw

OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу