First published: Wed Feb 03 2016(Updated: )
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystonemiddleware | >=1.6.0<2.3.3 | 2.3.3 |
pip/keystonemiddleware | >=0<1.5.4 | 1.5.4 |
pip/keystone | >=8.0<8.1.0 | 8.1.0 |
pip/keystonemiddleware | >=2.4.0<4.1.0 | 4.1.0 |
pip/keystone | >=9.0.0.0b1<9.0.0.0b2 | 9.0.0.0b2 |
OpenStack keystonemiddleware | >=1.5.0<=1.5.3 | |
OpenStack keystonemiddleware | >=1.6.0<=2.3.2 | |
OpenStack keystonemiddleware | >=8.0.0<8.0.2 | |
OpenStack keystonemiddleware | >=2015.1.0<=2015.1.2 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7546 is considered to have a medium severity risk due to improper token invalidation.
To fix CVE-2015-7546, upgrade keystonemiddleware to version 1.5.4 or later, or upgrade Keystone to version 8.0.2 or later.
Affected versions for CVE-2015-7546 include OpenStack Identity (Keystone) prior to 2015.1.3 and keystonemiddleware before 1.5.4.
Users of OpenStack Identity and keystonemiddleware on vulnerable versions are affected by CVE-2015-7546.
CVE-2015-7546 potentially allows attackers to misuse authorization tokens, leading to unauthorized actions.