CVE-2014-5252

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:2014.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:juno-2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2014.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:a:openstack:keystone:juno-1:*:*:*:*:*:*:*

Information

Published : 2014-08-25 07:55

Updated : 2014-10-09 22:23


NVD link : CVE-2014-5252

Mitre link : CVE-2014-5252


JSON object : View

CWE
CWE-255

Credentials Management Errors

Advertisement

dedicated server usa

Products Affected

canonical

  • ubuntu_linux

openstack

  • keystone