CVE-2021-3563 – keystone
Package
Manager: pip
Name: keystone
Vulnerable Version: >=0 <=21.0.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00034 pctl0.08404
Details
Openstack Keystone Incorrect Authorization vulnerability A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. A [patch](https://opendev.org/openstack/keystone/commit/7859ed26003858ebfd9a5e866b43f1a6a9e83dca) is available.
Metadata
Created: 2022-08-27T00:00:44Z
Modified: 2022-11-28T21:05:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-cc99-whm5-mmq3/GHSA-cc99-whm5-mmq3.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-cc99-whm5-mmq3
Finding: F006
Auto approve: 1