OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials
API when enforce_scope
is false. Users with a role on a project are able to view any other users’ credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
www.openwall.com/lists/oss-security/2019/12/11/8
access.redhat.com/errata/RHSA-2019:4358
bugs.launchpad.net/keystone/+bug/1855080
bugzilla.redhat.com/show_bug.cgi?id=1781470
git.openstack.org/cgit/openstack/keystone/commit/?id=17947516b0095c51da5cff94771247f2e7c44ee6
git.openstack.org/cgit/openstack/keystone/commit/?id=17c337dbdbfb9d548ad531c2ad0483c9bce5b98f
git.openstack.org/cgit/openstack/keystone/commit/?id=bd3f63787151183f4daa43578aa491856fefae5b
github.com/openstack/keystone
github.com/openstack/keystone/commit/17c337dbdbfb9d548ad531c2ad0483c9bce5b98f
nvd.nist.gov/vuln/detail/CVE-2019-19687
review.opendev.org/#/c/697355
review.opendev.org/#/c/697611
review.opendev.org/#/c/697731
security.openstack.org/ossa/OSSA-2019-006.html