First published: Mon Aug 25 2014(Updated: )
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | <8.0.0a0 | 8.0.0a0 |
OpenStack keystonemiddleware | =2014.1 | |
OpenStack keystonemiddleware | =2014.1.2 | |
OpenStack keystonemiddleware | =juno-1 | |
OpenStack keystonemiddleware | =juno-2 | |
Ubuntu Linux | =14.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5252 is considered to have a high severity due to its potential to allow unauthorized access via token bypass.
To fix CVE-2014-5252, upgrade OpenStack Keystone to version 2014.1.2.1 or later, or to the version specified in the remedy.
CVE-2014-5252 affects OpenStack Keystone versions 2014.1.x before 2014.1.2.1 and Juno versions before Juno-3.
CVE-2014-5252 can be exploited by remote authenticated users who can perform GET or HEAD requests.
CVE-2014-5252 allows attackers to bypass token expiration, potentially maintaining unauthorized access to resources.