CVE-2014-3621 – keystone
Package
Manager: pip
Name: keystone
Vulnerable Version: >=0 <8.0.0a0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00426 pctl0.61443
Details
OpenStack Identity Keystone Exposure of Sensitive Information The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
Metadata
Created: 2022-05-13T01:26:10Z
Modified: 2024-05-14T20:48:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8v8f-vc72-pmhc/GHSA-8v8f-vc72-pmhc.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-8v8f-vc72-pmhc
Finding: F038
Auto approve: 1