Lucene search

K
OpenstackPython-keystoneclient

7 matches found

CVE
CVE
added 2015/04/17 5:59 p.m.87 views

CVE-2015-1852

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-mi...

4.3CVSS7.1AI score0.00365EPSS
CVE
CVE
added 2019/12/10 3:15 p.m.85 views

CVE-2013-2166

python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass

9.8CVSS9.2AI score0.00087EPSS
CVE
CVE
added 2019/12/10 3:15 p.m.82 views

CVE-2013-2167

python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass

9.8CVSS9.2AI score0.00826EPSS
CVE
CVE
added 2013/10/01 8:55 p.m.66 views

CVE-2013-2013

The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.

2.1CVSS8.5AI score0.00065EPSS
CVE
CVE
added 2014/01/21 6:55 p.m.63 views

CVE-2013-2104

python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.

5.5CVSS8.8AI score0.00769EPSS
CVE
CVE
added 2014/04/15 2:55 p.m.56 views

CVE-2014-0105

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, rela...

6CVSS6.4AI score0.00371EPSS
CVE
CVE
added 2014/10/02 2:55 p.m.55 views

CVE-2014-7144

OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle at...

4.3CVSS6.2AI score0.00365EPSS