Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04djhmLXZjNzItcG1oY84AAQdq
OpenStack Identity Keystone Exposure of Sensitive Information
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
Permalink: https://github.com/advisories/GHSA-8v8f-vc72-pmhcJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04djhmLXZjNzItcG1oY84AAQdq
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 8 months ago
EPSS Percentage: 0.00213
EPSS Percentile: 0.58897
Identifiers: GHSA-8v8f-vc72-pmhc, CVE-2014-3621
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-3621
- https://bugs.launchpad.net/keystone/+bug/1354208
- http://rhn.redhat.com/errata/RHSA-2014-1688.html
- http://rhn.redhat.com/errata/RHSA-2014-1789.html
- http://rhn.redhat.com/errata/RHSA-2014-1790.html
- http://www.openwall.com/lists/oss-security/2014/09/16/10
- http://www.ubuntu.com/usn/USN-2406-1
- https://access.redhat.com/errata/RHSA-2014:1688
- https://access.redhat.com/errata/RHSA-2014:1789
- https://access.redhat.com/errata/RHSA-2014:1790
- https://access.redhat.com/security/cve/CVE-2014-3621
- https://bugzilla.redhat.com/show_bug.cgi?id=1139937
- https://github.com/openstack/keystone/commit/2989ff257e4fde6a168e25b926805e700406aa80
- https://github.com/openstack/keystone/commit/52714633c9a4dae5e60279217090859aa6dbcb4f
- https://github.com/advisories/GHSA-8v8f-vc72-pmhc
Blast Radius: 0.0
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0