First published: Mon Sep 30 2013(Updated: )
OpenStack Identity (Keystone) Folsom, Grizzly 2013.1.3 and earlier, and Havana before havana-3 does not properly revoke user tokens when a tenant is disabled, which allows remote authenticated users to retain access via the token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware | >=2013.1<=2013.1.3 | |
Fedora | =20 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Red Hat OpenStack for IBM Power | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4222 is considered a high-severity vulnerability due to its impact on authentication and access control.
To fix CVE-2013-4222, you should upgrade OpenStack Identity (Keystone) to version 2013.1.4 or later.
CVE-2013-4222 affects OpenStack Identity (Keystone) versions 2013.1.3 and earlier.
CVE-2013-4222 can allow remote authenticated users to retain access to resources even after their tenant has been disabled.
There is no official workaround for CVE-2013-4222; upgrading is the recommended approach.