Lucene search

K
githubGitHub Advisory DatabaseGHSA-W66P-78G4-MR7G
HistoryMay 17, 2022 - 1:39 a.m.

OpenStack Keystone Insufficient token expiration

2022-05-1701:39:21
GitHub Advisory Database
github.com
8

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.3%

OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

Affected configurations

Vulners
Node
keystone-enginekeystoneRange<8.0.0
CPENameOperatorVersion
keystonelt8.0.0

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.3%