Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nbXZwLTVyZjktbXhjbc4AAeO2
OpenStack Identity (Keystone) Multiple vulnerabilities in revocation events
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.
Permalink: https://github.com/advisories/GHSA-gmvp-5rf9-mxcmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nbXZwLTVyZjktbXhjbc4AAeO2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
EPSS Percentage: 0.00188
EPSS Percentile: 0.56507
Identifiers: GHSA-gmvp-5rf9-mxcm, CVE-2014-5251
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-5251
- https://bugs.launchpad.net/keystone/+bug/1347961
- http://rhn.redhat.com/errata/RHSA-2014-1121.html
- http://rhn.redhat.com/errata/RHSA-2014-1122.html
- http://www.openwall.com/lists/oss-security/2014/08/15/6
- http://www.ubuntu.com/usn/USN-2324-1
- https://github.com/openstack/keystone/commit/6cbf835542d62e6e5db4b4aef7141b1731cad9dc
- https://github.com/openstack/keystone/commit/7aee6304f653475a4130dc3e5be602e91481f108
- https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2014-107.yaml
- https://github.com/advisories/GHSA-gmvp-5rf9-mxcm
Blast Radius: 10.2
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0