logo

CVE-2013-0282 keystone

Package

Manager: pip
Name: keystone
Vulnerable Version: >=0 <8.0.0a0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00467 pctl0.63506

Details

OpenStack Keystone allows context-dependent attackers to bypass access restrictions OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.

Metadata

Created: 2022-05-05T02:48:43Z
Modified: 2024-05-09T16:47:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8833-qrvm-wc3h/GHSA-8833-qrvm-wc3h.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-8833-qrvm-wc3h
Finding: F039
Auto approve: 1