First published: Thu Sep 27 2012(Updated: )
Jason Xu (yinyangxu) discovered several vulnerabilities in OpenStack Keystone token verification: The first occurs in the API /v2.0/OS-KSADM/services and /v2.0/OS-KSADM/services/{service_id}, the second occurs in /v2.0/tenants/{tenant_id}/users/{user_id}/roles In both cases the OpenStack Keystone code fails to check if the tokens are valid. These issues have been addressed by adding checks in the form of test_service_crud_requires_auth() and test_user_role_list_requires_auth(). External references: <a href="https://bugs.launchpad.net/keystone/+bug/1006822">https://bugs.launchpad.net/keystone/+bug/1006822</a> <a href="https://bugs.launchpad.net/keystone/+bug/1006815">https://bugs.launchpad.net/keystone/+bug/1006815</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | >=2012.1<2012.1.2 | |
OpenStack Keystone | =2012.2-milestone1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.