First published: Sat Dec 14 2013(Updated: )
The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from a trust-scoped token and using them in an ec2tokens API request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware | >=2013.2<2013.2.1 | |
Ubuntu | =13.10 | |
Red Hat OpenStack for IBM Power | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6391 is classified with high severity due to the potential for privilege escalation by remote trust users.
To fix CVE-2013-6391, upgrade the OpenStack Keystone package to version 2013.2.1 or later.
CVE-2013-6391 affects users of OpenStack Identity (Keystone) versions prior to Havana 2013.2.1 and Icehouse before icehouse-2.
CVE-2013-6391 enables remote attackers to gain unauthorized privileges by generating EC2 credentials from a trust-scoped token.
Yes, CVE-2013-6391 affects OpenStack Keystone implementations on platforms like Ubuntu 13.10 and Red Hat OpenStack 4.0.