First published: Tue Jun 17 2014(Updated: )
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | <8.0.0a0 | 8.0.0a0 |
OpenStack Keystone | >=2013.2<2013.2.4 | |
OpenStack Keystone | >=2014.1<2014.1.2 | |
SUSE Cloud | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3476 is classified as a high severity vulnerability due to its potential to allow unauthorized privilege escalation.
To resolve CVE-2014-3476, upgrade OpenStack Keystone to version 2013.2.4 or later, or to version 2014.1.2 or later.
CVE-2014-3476 affects multiple versions of OpenStack Keystone, including those prior to 2013.2.4 and 2014.1.2.
Yes, CVE-2014-3476 can be exploited remotely by authenticated users utilizing certain tokens.
CVE-2014-3476 involves improper handling of chained delegation, allowing privilege escalation via trust or OAuth tokens.