Lucene search

K
cve[email protected]CVE-2012-3426
HistoryJul 31, 2012 - 10:45 a.m.

CVE-2012-3426

2012-07-3110:45:42
CWE-264
web.nvd.nist.gov
32
openstack
keystone
token expiration
authentication
authorization
nvd
cve-2012-3426

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

65.3%

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.

Affected configurations

NVD
Node
openstackessex
OR
openstackhorizonMatchfolsom-1
OR
openstackkeystoneMatch2012.1
OR
openstackkeystoneMatch2012.1.1

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

65.3%