OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-0014 | OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. |
Github GHSA |
GHSA-w66p-78g4-mr7g | OpenStack Keystone Insufficient token expiration |
Ubuntu USN |
USN-1641-1 | OpenStack Keystone vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T21:14:15.420Z
Reserved: 2012-10-24T00:00:00
Link: CVE-2012-5563
No data.
Status : Deferred
Published: 2012-12-18T01:55:03.507
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-5563
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN