Lucene search

K
cveRedhatCVE-2015-1852
HistoryApr 17, 2015 - 5:59 p.m.

CVE-2015-1852

2015-04-1717:59:02
CWE-17
redhat
web.nvd.nist.gov
70
openstack
keystonemiddleware
python-keystoneclient
vulnerability
certification verification
cve-2015-1852
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.1

Confidence

High

EPSS

0.004

Percentile

73.1%

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the “insecure” option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

Affected configurations

Nvd
Node
openstackkeystonemiddlewareRange1.5.0
OR
openstackpython-keystoneclientRange1.3.0
Node
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch15.04
VendorProductVersionCPE
openstackkeystonemiddleware*cpe:2.3:a:openstack:keystonemiddleware:*:*:*:*:*:*:*:*
openstackpython-keystoneclient*cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:*
canonicalubuntu_linux14.04cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
canonicalubuntu_linux15.04cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.1

Confidence

High

EPSS

0.004

Percentile

73.1%