openstack-keystone is vulnerable to information disclosure attacks. The vulnerability exists as the catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by “$(admin_token)” in the publicurl endpoint field.
rhn.redhat.com/errata/RHSA-2014-1688.html
rhn.redhat.com/errata/RHSA-2014-1789.html
rhn.redhat.com/errata/RHSA-2014-1790.html
www.openwall.com/lists/oss-security/2014/09/16/10
www.ubuntu.com/usn/USN-2406-1
access.redhat.com/errata/RHSA-2014:1688
access.redhat.com/errata/RHSA-2014:1789
access.redhat.com/errata/RHSA-2014:1790
access.redhat.com/security/cve/CVE-2014-3621
access.redhat.com/security/updates/classification/#important
bugs.launchpad.net/keystone/+bug/1354208
bugzilla.redhat.com/show_bug.cgi?id=1139937
bugzilla.redhat.com/show_bug.cgi?id=1149748
rhn.redhat.com/errata/RHSA-2014-1789.html
wiki.openstack.org/wiki/ReleaseNotes/2014.1.3