CVE-2019-19687 – keystone
Package
Manager: pip
Name: keystone
Vulnerable Version: =15.0.0 || >=15.0.0 <15.0.1 || =16.0.0 || >=16.0.0 <16.0.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00766 pctl0.72557
Details
OpenStack Keystone Credential Leakage OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the `/v3/credentials` API when `enforce_scope` is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
Metadata
Created: 2022-05-24T17:02:55Z
Modified: 2024-09-27T20:36:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2j23-fwqm-mgwr/GHSA-2j23-fwqm-mgwr.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-2j23-fwqm-mgwr
Finding: F035
Auto approve: 1