First published: Tue Dec 18 2012(Updated: )
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Folsom | =2012.2 | |
pip/keystone | <8.0.0 | 8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5563 is considered a high severity vulnerability due to its potential to allow unauthorized access through token chaining.
To fix CVE-2012-5563, upgrade OpenStack Keystone to version 8.0.0 or later.
CVE-2012-5563 affects users running OpenStack Folsom version 2012.2 and earlier versions of Keystone.
Exploiting CVE-2012-5563 allows remote authenticated users to bypass authorization restrictions, potentially leading to unauthorized data access.
Yes, CVE-2012-5563 is recognized as a vulnerability in OpenStack Keystone, linked to a regression in CVE-2012-3426.