OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-0016 | OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. |
Github GHSA |
GHSA-qvpr-qm6w-6rcc | OpenStack Keystone intended authorization restrictions bypass |
Ubuntu USN |
USN-1641-1 | OpenStack Keystone vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T21:14:15.748Z
Reserved: 2012-10-24T00:00:00
Link: CVE-2012-5571
No data.
Status : Deferred
Published: 2012-12-18T01:55:03.570
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-5571
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN