Lucene search

K

5 matches found

CVE
CVE
added 2012/07/31 10:45 a.m.64 views

CVE-2012-3426

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging ...

4.9CVSS6.1AI score0.00208EPSS
CVE
CVE
added 2012/09/18 5:55 p.m.55 views

CVE-2012-4413

OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.

4CVSS6.1AI score0.00428EPSS
CVE
CVE
added 2012/12/26 10:55 p.m.50 views

CVE-2012-5483

tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading administrative access and secret values from thi...

2.1CVSS6.1AI score0.00111EPSS
CVE
CVE
added 2012/10/09 3:55 p.m.47 views

CVE-2012-4456

The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.

7.5CVSS6.6AI score0.0395EPSS
CVE
CVE
added 2012/10/09 3:55 p.m.43 views

CVE-2012-4457

OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.

4CVSS6.2AI score0.00561EPSS