First published: Tue Dec 18 2012(Updated: )
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Essex | =2012.1 | |
OpenStack Folsom | =2012.2 | |
pip/Keystone | <8.0.0a0 | 8.0.0a0 |
pip/keystone | >=0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-5571 is considered high due to the potential for unauthorized access to sensitive resources.
To fix CVE-2012-5571, upgrade Keystone to a version higher than 8.0.0a0.
CVE-2012-5571 affects OpenStack Essex (2012.1) and OpenStack Folsom (2012.2).
Users can exploit CVE-2012-5571 by using an EC2 token for a role that has been removed from their tenant, bypassing authorization mechanisms.
Yes, CVE-2012-5571 specifically allows remote authenticated users to bypass authorization restrictions.