First published: Mon Nov 05 2012(Updated: )
tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading administrative access and secret values from this file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | =2012.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5483 is rated as a Medium severity vulnerability due to the potential for local users to access sensitive data.
To fix CVE-2012-5483, you should change the permissions of /etc/keystone/ec2rc to restrict access to only authorized users.
CVE-2012-5483 allows local users to gain unauthorized access to Amazon EC2 services by reading sensitive information from a world-readable file.
CVE-2012-5483 specifically affects OpenStack Keystone version 2012.1.3.
CVE-2012-5483 is not remotely exploitable as it requires local access to the affected system.