Lucene search

K
OpenstackKeystone2013.1

6 matches found

CVE
CVE
added 2013/04/12 10:55 p.m.64 views

CVE-2013-0270

OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.

5CVSS6.7AI score0.01809EPSS
CVE
CVE
added 2013/09/23 8:55 p.m.59 views

CVE-2013-4294

The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.

5CVSS6.4AI score0.008EPSS
CVE
CVE
added 2013/05/21 6:55 p.m.52 views

CVE-2013-2059

OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.

6CVSS6.3AI score0.00908EPSS
CVE
CVE
added 2013/04/12 10:55 p.m.51 views

CVE-2013-0282

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

5CVSS6.3AI score0.00467EPSS
CVE
CVE
added 2014/04/15 2:55 p.m.49 views

CVE-2014-2828

The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining."

7.8CVSS6.6AI score0.00864EPSS
CVE
CVE
added 2014/04/01 6:35 a.m.44 views

CVE-2014-2237

The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being in...

5CVSS6.2AI score0.00256EPSS