Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02bXYzLXAyZ3Itd2dxZs4AAdiZ
OpenStack Identity (Keystone) DoS through V3 API authentication chaining
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining."
Permalink: https://github.com/advisories/GHSA-6mv3-p2gr-wgqfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02bXYzLXAyZ3Itd2dxZs4AAdiZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.00766
EPSS Percentile: 0.81022
Identifiers: GHSA-6mv3-p2gr-wgqf, CVE-2014-2828
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-2828
- https://bugs.launchpad.net/keystone/+bug/1300274
- http://rhn.redhat.com/errata/RHSA-2014-1688.html
- http://www.openwall.com/lists/oss-security/2014/04/10/20
- https://github.com/openstack/keystone/commit/ce6cedb30c5c4b4cf4db9380f09443de22414b39
- https://github.com/openstack/keystone/commit/e364ba5b12de8e4c11bd80bcca903f9615dcfc2e
- https://github.com/openstack/keystone/commit/ef868ad92c00e23a4a5e9eb71e3e0bf5ae2fff0c
- https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2014-106.yaml
- https://github.com/advisories/GHSA-6mv3-p2gr-wgqf
Blast Radius: 11.8
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0