CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
73.1%
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the “insecure” option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
Vendor | Product | Version | CPE |
---|---|---|---|
openstack | keystonemiddleware | * | cpe:2.3:a:openstack:keystonemiddleware:*:*:*:*:*:*:*:* |
openstack | python-keystoneclient | * | cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 15.04 | cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* |
lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html
rhn.redhat.com/errata/RHSA-2015-1677.html
rhn.redhat.com/errata/RHSA-2015-1685.html
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.securityfocus.com/bid/74187
www.ubuntu.com/usn/USN-2705-1
bugs.launchpad.net/keystonemiddleware/+bug/1411063