Lucene search

K
cve[email protected]CVE-2014-3621
HistoryOct 02, 2014 - 2:55 p.m.

CVE-2014-3621

2014-10-0214:55:03
CWE-200
web.nvd.nist.gov
36
cve-2014-3621
openstack identity
keystone
remote code execution
security vulnerability
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

5.8 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

71.5%

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by “$(admin_token)” in the publicurl endpoint field.

Affected configurations

NVD
Node
openstackkeystoneRange2013.22013.2.3
OR
openstackkeystoneRange2014.12014.1.2.1
Node
canonicalubuntu_linuxMatch14.04lts
Node
redhatopenstackMatch5.0
AND
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
redhatopenstackMatch4.0

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

5.8 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

71.5%