Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yMnE2LXd3cTctMmpqOc4AAe3p
OpenStack Keystone Improper Authentication vulnerability
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
Permalink: https://github.com/advisories/GHSA-22q6-wwq7-2jj9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yMnE2LXd3cTctMmpqOc4AAe3p
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Percentage: 0.01902
EPSS Percentile: 0.88234
Identifiers: GHSA-22q6-wwq7-2jj9, CVE-2013-1865
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-1865
- https://bugs.launchpad.net/keystone/+bug/1129713
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101719.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-0708.html
- http://www.openwall.com/lists/oss-security/2013/03/20/13
- http://www.ubuntu.com/usn/USN-1772-1
- https://access.redhat.com/errata/RHSA-2013:0708
- https://access.redhat.com/security/cve/CVE-2013-1865
- https://bugzilla.redhat.com/show_bug.cgi?id=922230
- https://review.openstack.org/24906
- https://web.archive.org/web/20170715155558/http://www.securityfocus.com/bid/58616
- http://github.com/openstack/keystone/commit/255b1d43500f5d98ec73a0056525b492b14fec05
- https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-39.yaml
- https://review.openstack.org/#/c/24906
- https://github.com/advisories/GHSA-22q6-wwq7-2jj9
Blast Radius: 8.3
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: >= 2012.2, < 2012.2.4
Fixed in: 2012.2.4
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0