Lucene search

K
githubGitHub Advisory DatabaseGHSA-P9WQ-MJH8-Q72M
HistoryMay 17, 2022 - 3:17 a.m.

OpenStack keystonemiddleware and python-keystoneclient vulnerable to man-in-the-middle attacks

2022-05-1703:17:26
GitHub Advisory Database
github.com
16
openstack
keystonemiddleware
python-keystoneclient
man-in-the-middle
s3_token
certification verification
paste configuration
remote attackers
crafted certificate

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.004

Percentile

73.1%

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the “insecure” option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

Affected configurations

Vulners
Node
pythonkeystoneclientRange<1.4.0
OR
openstackkeystonemiddlewareRange<1.6.0

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.004

Percentile

73.1%