OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/68026 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/keystone/+bug/1324592 | Exploit Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/06/12/3 | Mailing List Patch Third Party Advisory |
http://secunia.com/advisories/57886 | Third Party Advisory |
http://secunia.com/advisories/59547 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html | Mailing List Third Party Advisory |
Information
Published : 2014-06-17 07:55
Updated : 2020-06-02 12:49
NVD link : CVE-2014-3476
Mitre link : CVE-2014-3476
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
openstack
- keystone
suse
- cloud