7.5
CWE
17 295
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2015-1852

First published: Tue Apr 07 2015(Updated: )

A vulnerability was discovered in OpenStack: Title: S3Token TLS cert verification option not honored Reporter: Brant Knudson (IBM) Products: keystonemiddleware, python-keystoneclient Affects: versions up to 1.5.0 (keystonemiddleware), versions up to 0.11.2 (python-keystoneclient) Description: Brant Knudson from IBM reported a vulnerability in keystonemiddleware (formerly shipped as python-keystoneclient). When the 'insecure' option is set in a S3Token paste configuration file its value is effectively ignored and instead assumed to be true. As a result certificate verification will be disabled, leaving TLS connections open to MITM attacks. Note that it's unusual to explicitly add this option and then set it to false, so the impact of this bug is thought to be limited. All versions of s3_token middleware with TLS settings configured are affected by this flaw. Acknowledgements: Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
pip/python-keystoneclient<1.4.0
1.4.0
pip/keystonemiddleware<1.6.0
1.6.0
OpenStack keystonemiddleware<=1.5.0
OpenStack Keystone<=1.3.0
Ubuntu=14.04
Ubuntu=15.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-1852?

    CVE-2015-1852 is classified as a moderate severity vulnerability.

  • How do I fix CVE-2015-1852?

    To fix CVE-2015-1852, upgrade python-keystoneclient to version 1.4.0 or later, and keystonemiddleware to version 1.6.0 or later.

  • Which OpenStack products are affected by CVE-2015-1852?

    CVE-2015-1852 affects versions up to 1.5.0 of keystonemiddleware and versions up to 0.11.2 of python-keystoneclient.

  • What impact does CVE-2015-1852 have on system security?

    CVE-2015-1852 can lead to an insecure configuration as the S3Token TLS certificate verification option is not honored.

  • Who reported CVE-2015-1852?

    CVE-2015-1852 was reported by Brant Knudson from IBM.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203