Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04ODMzLXFydm0td2MzaM3iSg
OpenStack Keystone allows context-dependent attackers to bypass access restrictions
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
Permalink: https://github.com/advisories/GHSA-8833-qrvm-wc3hJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04ODMzLXFydm0td2MzaM3iSg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 7 months ago
Identifiers: GHSA-8833-qrvm-wc3h, CVE-2013-0282
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-0282
- https://bugs.launchpad.net/keystone/+bug/1121494
- https://launchpad.net/keystone/+milestone/2012.2.4
- https://launchpad.net/keystone/grizzly/2013.1
- https://review.openstack.org/#/c/22319/
- https://review.openstack.org/#/c/22320/
- https://review.openstack.org/#/c/22321/
- http://www.openwall.com/lists/oss-security/2013/02/19/3
- https://github.com/openstack/keystone/commit/7402f5ef994599653bdbb3ed5ff1a2b8c3e72b9f
- https://github.com/openstack/keystone/commit/9572bfc393f66f5ce3b44c0a77a9e29cc0374c6f
- https://github.com/openstack/keystone/commit/f0b4d300db5cc61d4f079f8bce9da8e8bea1081a
- https://github.com/advisories/GHSA-8833-qrvm-wc3h
Blast Radius: 0.0
Affected Packages
pypi:Keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 17,946 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0