python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-0091 python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
Github GHSA Github GHSA GHSA-4rrr-j7ff-r844 python-keystoneclient missing expiration check in PKI token validation
Ubuntu USN Ubuntu USN USN-1851-1 python-keystoneclient vulnerability
Ubuntu USN Ubuntu USN USN-1875-1 OpenStack Keystone vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T15:27:40.698Z

Reserved: 2013-02-19T00:00:00

Link: CVE-2013-2104

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-01-21T18:55:09.413

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-2104

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-05-28T00:00:00Z

Links: CVE-2013-2104 - Bugzilla

cve-icon OpenCVE Enrichment

No data.