First published: Thu Oct 02 2014(Updated: )
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (`paste.ini`) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-keystoneclient | >=1.0<1.2.0 | 1.2.0 |
pip/python-keystoneclient | >=0<0.11.0 | 0.11.0 |
pip/keystonemiddleware | >=1.0<1.2.0 | 1.2.0 |
pip/keystonemiddleware | <0.11.0 | 0.11.0 |
OpenStack keystonemiddleware | =1.0.0 | |
OpenStack keystonemiddleware | =1.1.0 | |
OpenStack keystonemiddleware | =1.1.1 | |
OpenStack Keystone | <=0.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7144 is classified as a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2014-7144, upgrade to keystonemiddleware version 1.2.0 or python-keystoneclient version 1.2.0 or higher.
CVE-2014-7144 affects versions of OpenStack keystonemiddleware 0.x before 0.11.0 and 1.x before 1.2.0, as well as python-keystoneclient versions prior to 1.2.0.
CVE-2014-7144 allows remote attackers to perform man-in-the-middle attacks due to disabled certificate verification.
The 'insecure' option set in the paste configuration ('paste.ini') file is directly related to the vulnerability in CVE-2014-7144.