CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
EPSS
Percentile
71.2%
A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user’s complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches “thread” to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.
Vendor | Product | Version | CPE |
---|---|---|---|
python-keystoneclient | python-keystoneclient | * | cpe:2.3:a:python-keystoneclient:python-keystoneclient:*:*:*:*:*:*:*:* |
rhn.redhat.com/errata/RHSA-2014-0382.html
rhn.redhat.com/errata/RHSA-2014-0409.html
www.openwall.com/lists/oss-security/2014/03/27/4
bugs.launchpad.net/python-keystoneclient/+bug/1282865
github.com/advisories/GHSA-gwvq-rgqf-993f
nvd.nist.gov/vuln/detail/CVE-2014-0105
review.opendev.org/c/openstack/python-keystoneclient/+/81078