First published: Wed Feb 03 2016(Updated: )
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware | >=1.5.0<=1.5.3 | |
OpenStack keystonemiddleware | >=1.6.0<=2.3.2 | |
OpenStack Keystone | >=8.0.0<8.0.2 | |
OpenStack Keystone | >=2015.1.0<=2015.1.2 | |
Oracle Solaris | =11.3 | |
pip/keystonemiddleware | >=1.6.0<2.3.3 | 2.3.3 |
pip/keystonemiddleware | >=0<1.5.4 | 1.5.4 |
pip/keystone | >=8.0<8.1.0 | 8.1.0 |
pip/keystonemiddleware | >=2.4.0<4.1.0 | 4.1.0 |
pip/keystone | >=9.0.0.0b1<9.0.0.0b2 | 9.0.0.0b2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.