OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2012-0016 | OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. |
![]() |
GHSA-qvpr-qm6w-6rcc | OpenStack Keystone intended authorization restrictions bypass |
![]() |
USN-1641-1 | OpenStack Keystone vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T21:14:15.748Z
Reserved: 2012-10-24T00:00:00
Link: CVE-2012-5571

No data.

Status : Deferred
Published: 2012-12-18T01:55:03.570
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-5571


No data.