The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/keystone/+bug/1490804 | Issue Tracking Third Party Advisory |
https://wiki.openstack.org/wiki/OSSN/OSSN-0062 | Vendor Advisory |
https://security.openstack.org/ossa/OSSA-2016-005.html | Patch Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
http://www.securityfocus.com/bid/80498 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-02-03 10:59
Updated : 2020-06-02 11:57
NVD link : CVE-2015-7546
Mitre link : CVE-2015-7546
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
openstack
- keystonemiddleware
- keystone
oracle
- solaris