First published: Thu Sep 27 2012(Updated: )
Jason Xu (yinyangxu) discovered several vulnerabilities in OpenStack Keystone token verification: The first occurs in the API /v2.0/OS-KSADM/services and /v2.0/OS-KSADM/services/{service_id}, the second occurs in /v2.0/tenants/{tenant_id}/users/{user_id}/roles In both cases the OpenStack Keystone code fails to check if the tokens are valid. These issues have been addressed by adding checks in the form of test_service_crud_requires_auth() and test_user_role_list_requires_auth(). External references: <a href="https://bugs.launchpad.net/keystone/+bug/1006822">https://bugs.launchpad.net/keystone/+bug/1006822</a> <a href="https://bugs.launchpad.net/keystone/+bug/1006815">https://bugs.launchpad.net/keystone/+bug/1006815</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware | >=2012.1<2012.1.2 | |
OpenStack keystonemiddleware | =2012.2-milestone1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4456 has been classified as a medium severity vulnerability affecting OpenStack Keystone.
To remediate CVE-2012-4456, upgrade OpenStack Keystone to versions above 2012.1.2 or to 2012.2-milestone1.
CVE-2012-4456 affects the OpenStack Keystone versions from 2012.1 to 2012.1.2 and the specific milestone version 2012.2-milestone1.
The vulnerability in CVE-2012-4456 affects the API calls regarding services and user roles in the Keystone service.
CVE-2012-4456 was discovered by Jason Xu, also known by the handle yinyangxu.