Логотип exploitDog
bind:CVE-2020-12690
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-12690

Количество 5

Количество 5

ubuntu логотип

CVE-2020-12690

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2020-12690

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2020-12690

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-12690

почти 6 лет назад

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6m8p-x4qw-gh5j

больше 4 лет назад

Insufficient Session Expiration in OpenStack Keystone

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-12690

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-12690

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-12690

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-12690

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0. ...

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
github логотип
GHSA-6m8p-x4qw-gh5j

Insufficient Session Expiration in OpenStack Keystone

CVSS3: 8.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу