Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tZjk4LXIyZ2YtMngzd84AAU0b
OpenStack Keystone Improper Authentication vulnerability
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
Permalink: https://github.com/advisories/GHSA-mf98-r2gf-2x3wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tZjk4LXIyZ2YtMngzd84AAU0b
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
Identifiers: GHSA-mf98-r2gf-2x3w, CVE-2012-4456
References:
- https://nvd.nist.gov/vuln/detail/CVE-2012-4456
- https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
- https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
- https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
- https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
- https://bugs.launchpad.net/keystone/+bug/1006815
- https://bugs.launchpad.net/keystone/+bug/1006822
- https://bugzilla.redhat.com/show_bug.cgi?id=861179
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78944
- https://lists.launchpad.net/openstack/msg17034.html
- http://www.openwall.com/lists/oss-security/2012/09/28/5
- https://access.redhat.com/errata/RHSA-2012:1378
- https://access.redhat.com/security/cve/CVE-2012-4456
- https://web.archive.org/web/20121114024512/http://www.securityfocus.com/bid/55716
- https://github.com/advisories/GHSA-mf98-r2gf-2x3w
Blast Radius: 0.0
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 17,946 last month
Affected Version Ranges: >= 2012.1, < 2012.1.2
Fixed in: 2012.1.2
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0