First published: Mon Aug 25 2014(Updated: )
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | <8.0.0a0 | 8.0.0a0 |
OpenStack keystonemiddleware | =2014.1 | |
OpenStack keystonemiddleware | =2014.1.2 | |
OpenStack keystonemiddleware | =juno-1 | |
OpenStack keystonemiddleware | =juno-2 | |
Ubuntu Linux | =14.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5253 is rated as a moderate severity vulnerability affecting OpenStack Identity (Keystone).
To fix CVE-2014-5253, upgrade to Keystone version 2014.1.2.1 or later for the 2014.1.x series or to Juno-3 or later for the Juno series.
CVE-2014-5253 affects remote authenticated users of OpenStack Identity (Keystone) versions prior to 2014.1.2.1 and Juno prior to Juno-3.
CVE-2014-5253 allows attackers to retain access to resources via a domain-scoped token even after the related domain has been invalidated.
CVE-2014-5253 impacts Keystone versions 2014.1.x before 2014.1.2.1 and Juno versions before Juno-3.