First published: Mon Aug 25 2014(Updated: )
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | =2014.1 | |
OpenStack Keystone | =2014.1.2 | |
OpenStack Keystone | =juno-1 | |
OpenStack Keystone | =juno-2 | |
Canonical Ubuntu Linux | =14.04 | |
pip/keystone | <8.0.0a0 | 8.0.0a0 |
=2014.1 | ||
=2014.1.2 | ||
=juno-1 | ||
=juno-2 | ||
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.