6 Medium
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.9%
Chmouel Boudjnah discovered that Keystone did not properly invalidate user
tokens when a tenant was disabled which allowed an authenticated user to
retain access via the token. (CVE-2013-4222)
Kieran Spear discovered that Keystone did not properly verify PKI tokens
when performing revocation when using the memcache and KVS backends. An
authenticated attacker could exploit this to bypass intended access
restrictions. (CVE-2013-4294)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.04 | noarch | python-keystone | < 1:2013.1.3-0ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | keystone | < 1:2013.1.3-0ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | keystone-doc | < 1:2013.1.3-0ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | python-keystone | < 2012.2.4-0ubuntu3.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone | < 2012.2.4-0ubuntu3.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone-doc | < 2012.2.4-0ubuntu3.2 | UNKNOWN |