Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oajg5LXFteDktOHFtaM4AAZ5u
OpenStack Identity (Keystone) improper revoking of the authentication token when deleting a user
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
Permalink: https://github.com/advisories/GHSA-hj89-qmx9-8qmhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oajg5LXFteDktOHFtaM4AAZ5u
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 6 months ago
Identifiers: GHSA-hj89-qmx9-8qmh, CVE-2013-2059
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-2059
- https://bugs.launchpad.net/keystone/+bug/1166670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84135
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106220.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00085.html
- http://osvdb.org/93134
- http://secunia.com/advisories/53326
- http://secunia.com/advisories/53339
- http://www.openwall.com/lists/oss-security/2013/05/09/3
- http://www.openwall.com/lists/oss-security/2013/05/09/4
- http://www.securityfocus.com/bid/59787
- https://github.com/openstack/keystone/commit/33214f311aa36b17f8f5ff06bee2130bf061df8f
- https://github.com/openstack/keystone/commit/678b06a91f772d6be82eb54ed11f27e20f446b57
- https://github.com/openstack/keystone/commit/992466d1dbf80a940190703dedf800d6d12dede8
- https://github.com/advisories/GHSA-hj89-qmx9-8qmh
Blast Radius: 0.0
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 17,946 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0