Lucene search

K
githubGitHub Advisory DatabaseGHSA-GWVQ-RGQF-993F
HistoryMay 17, 2022 - 12:13 a.m.

python-keystoneclient vulnerable to context confusion in Keystone auth_token middleware

2022-05-1700:13:54
CWE-522
GitHub Advisory Database
github.com
10
keystone auth_token middleware
context confusion
vulnerability
privilege escalation
python-keystoneclient
memcache vulnerability

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

71.2%

A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user’s complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches “thread” to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.

Affected configurations

Vulners
Node
python-keystoneclientpython-keystoneclientRange0.6.0
VendorProductVersionCPE
python-keystoneclientpython-keystoneclient*cpe:2.3:a:python-keystoneclient:python-keystoneclient:*:*:*:*:*:*:*:*

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

71.2%