Description
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
Published: 2020-01-17
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-13318 The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
History

No history.

Subscriptions

Hp Helion Openstack
Suse Keystone-json-assignment Openstack Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2024-09-17T02:53:23.354Z

Reserved: 2019-01-03T00:00:00.000Z

Link: CVE-2019-3683

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-17T11:15:11.813

Modified: 2024-11-21T04:42:19.500

Link: CVE-2019-3683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses