CVE-2014-3476

OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
References
Link Resource
http://www.securityfocus.com/bid/68026 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1324592 Exploit Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/06/12/3 Mailing List Patch Third Party Advisory
http://secunia.com/advisories/57886 Third Party Advisory
http://secunia.com/advisories/59547 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:suse:cloud:3:*:*:*:*:*:*:*

Information

Published : 2014-06-17 07:55

Updated : 2020-06-02 12:49


NVD link : CVE-2014-3476

Mitre link : CVE-2014-3476


JSON object : View

CWE
CWE-269

Improper Privilege Management

Advertisement

dedicated server usa

Products Affected

openstack

  • keystone

suse

  • cloud