logo

CVE-2012-5571 keystone

Package

Manager: pip
Name: keystone
Vulnerable Version: >=0 <8.0.0a0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00306 pctl0.5326

Details

OpenStack Keystone intended authorization restrictions bypass OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Metadata

Created: 2022-05-17T01:39:21Z
Modified: 2024-11-21T21:48:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qvpr-qm6w-6rcc/GHSA-qvpr-qm6w-6rcc.json
CWE IDs: []
Alternative ID: GHSA-qvpr-qm6w-6rcc
Finding: F006
Auto approve: 1