logo

CVE-2020-12692 keystone

Package

Manager: pip
Name: keystone
Vulnerable Version: >=16.0.0.0rc1 <16.0.0 || >=0 <15.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00098 pctl0.28011

Details

OpenStack Keystone does not check signature TTL of the EC2 credential auth method An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Metadata

Created: 2022-05-24T17:17:23Z
Modified: 2024-09-27T21:21:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rqw2-hhrf-7936/GHSA-rqw2-hhrf-7936.json
CWE IDs: ["CWE-311", "CWE-347"]
Alternative ID: GHSA-rqw2-hhrf-7936
Finding: F163
Auto approve: 1