Description
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0098 | An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. |
Github GHSA |
GHSA-rqw2-hhrf-7936 | OpenStack Keystone does not check signature TTL of the EC2 credential auth method |
Ubuntu USN |
USN-4480-1 | OpenStack Keystone vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:04:22.870Z
Reserved: 2020-05-06T00:00:00.000Z
Link: CVE-2020-12692
No data.
Status : Modified
Published: 2020-05-07T00:15:10.987
Modified: 2024-11-21T05:00:05.037
Link: CVE-2020-12692
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN