First published: Wed Sep 05 2012(Updated: )
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Essex | =2012.1 | |
OpenStack Horizon | =folsom-3 | |
pip/keystone | <2012.1 | 2012.1 |
=2012.1 | ||
=folsom-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3542 is considered a high severity vulnerability due to its potential for unauthorized user modification in OpenStack.
To fix CVE-2012-3542, update OpenStack Keystone to version 2012.1 or later.
CVE-2012-3542 affects users of OpenStack Keystone in versions prior to folsom-rc1 and OpenStack Essex 2012.1.
The impact of CVE-2012-3542 is that remote attackers can exploit it to add arbitrary users to any tenant.
Yes, a patch is available in OpenStack versions 2012.1 and above to remediate CVE-2012-3542.