First published: Fri Apr 12 2013(Updated: )
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | >=2012.1<=2012.1.3 | |
OpenStack Keystone | >=2012.2<=2012.2.4 | |
OpenStack Keystone | =2013.1-milestone1 | |
OpenStack Keystone | =2013.1-milestone2 | |
OpenStack Keystone | =2013.1-milestone3 | |
pip/Keystone | <8.0.0a0 | 8.0.0a0 |
>=2012.1<=2012.1.3 | ||
>=2012.2<=2012.2.4 | ||
=2013.1-milestone1 | ||
=2013.1-milestone2 | ||
=2013.1-milestone3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.