A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches "thread" to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.
References:- https://nvd.nist.gov/vuln/detail/CVE-2014-0105
- https://bugs.launchpad.net/python-keystoneclient/+bug/1282865
- http://rhn.redhat.com/errata/RHSA-2014-0382.html
- http://rhn.redhat.com/errata/RHSA-2014-0409.html
- http://www.openwall.com/lists/oss-security/2014/03/27/4
- https://review.opendev.org/c/openstack/python-keystoneclient/+/81078
- https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-70.yaml
- https://github.com/advisories/GHSA-gwvq-rgqf-993f