First published: Tue May 21 2013(Updated: )
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | <8.0.0a0 | 8.0.0a0 |
OpenStack keystonemiddleware | =2012.1 | |
OpenStack keystonemiddleware | =2013.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2059 is considered a medium severity vulnerability due to the potential for unauthorized access to user accounts.
To fix CVE-2013-2059, users should upgrade to OpenStack Keystone version 2013.1.1 or later.
The impact of CVE-2013-2059 allows remote authenticated users to retain access to the system even after their user account has been deleted.
CVE-2013-2059 affects OpenStack Identity (Keystone) versions 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana.
While the primary mitigation for CVE-2013-2059 is upgrading, admins may consider manually revoking tokens when deleting a user as a temporary workaround.