First published: Tue Dec 18 2012(Updated: )
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Essex | =2012.1 | |
OpenStack Folsom | =2012.2 | |
pip/Keystone | <8.0.0a0 | 8.0.0a0 |
pip/keystone | >=0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.