Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12OGZxLWdxOWotM3Y3aM4AAePA
OpenStack Identity (Keystone) UUID v2 tokens does not expire with revocation events
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Permalink: https://github.com/advisories/GHSA-v8fq-gq9j-3v7hJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12OGZxLWdxOWotM3Y3aM4AAePA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
EPSS Percentage: 0.00169
EPSS Percentile: 0.54087
Identifiers: GHSA-v8fq-gq9j-3v7h, CVE-2014-5252
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-5252
- https://bugs.launchpad.net/keystone/+bug/1348820
- http://rhn.redhat.com/errata/RHSA-2014-1121.html
- http://rhn.redhat.com/errata/RHSA-2014-1122.html
- http://www.openwall.com/lists/oss-security/2014/08/15/6
- http://www.ubuntu.com/usn/USN-2324-1
- https://github.com/openstack/keystone/commit/556fb860311675fc437585651e4602b2908451eb
- https://github.com/openstack/keystone/commit/a4c73e4382cb062aa9f30fe1960d5014d3c49cc2
- https://github.com/openstack/keystone/commit/bdb88c662ac2035f9b0d8a229a5db5f60f5f16ae
- https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2014-108.yaml
- https://github.com/advisories/GHSA-v8fq-gq9j-3v7h
Blast Radius: 10.2
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0