An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4044-1 swauth security update
EUVD EUVD EUVD-2017-0133 An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
Github GHSA Github GHSA GHSA-qhq8-xwqv-pvv9 OpenStack Swauth object/proxy server writing Auth Token to log file
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:27:04.365Z

Reserved: 2017-11-06T00:00:00

Link: CVE-2017-16613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-11-21T13:29:00.267

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-16613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.