Lucene search

K
OpenstackKeystone16.0.0

5 matches found

CVE
CVE
added 2020/05/07 12:15 a.m.99 views

CVE-2020-12690

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This...

8.8CVSS8.4AI score0.00817EPSS
CVE
CVE
added 2020/05/07 12:15 a.m.80 views

CVE-2020-12689

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially...

8.8CVSS8.3AI score0.00521EPSS
CVE
CVE
added 2020/05/07 12:15 a.m.79 views

CVE-2020-12691

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. T...

8.8CVSS8.3AI score0.03012EPSS
CVE
CVE
added 2020/05/07 12:15 a.m.75 views

CVE-2020-12692

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

5.5CVSS5.5AI score0.00114EPSS
CVE
CVE
added 2019/12/09 6:15 p.m.55 views

CVE-2019-19687

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, whi...

8.8CVSS8.2AI score0.00766EPSS