Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-3621
HistoryOct 02, 2014 - 12:00 a.m.

CVE-2014-3621

2014-10-0200:00:00
ubuntu.com
ubuntu.com
9

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

71.5%

The catalog url replacement in OpenStack Identity (Keystone) before
2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to
read sensitive configuration options via a crafted endpoint, as
demonstrated by “$(admin_token)” in the publicurl endpoint field.

Bugs

Notes

Author Note
jdstrand 12.04 is affected. Create test service and malicious endpoint as per the bug, then do (assumes ‘testadmin’ is in the ‘admin’ project (use tenant id from `keystone tenant-list
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchkeystone< 1:2014.1.3-0ubuntu1UNKNOWN
ubuntu14.10noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN
ubuntu15.04noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN
ubuntu15.10noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN
ubuntu16.04noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN
ubuntu16.10noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN
ubuntu17.04noarchkeystone< 1:2014.2~rc1-0ubuntu1UNKNOWN

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

71.5%