First published: Mon Jun 13 2016(Updated: )
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | >=9.0.0<9.0.1 | 9.0.1 |
OpenStack Keystone | =9.0.0.0-rc1 | |
OpenStack Keystone | =9.0.0.0-rc2 | |
OpenStack Keystone | =9.0.0.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4911 is rated as important due to its potential to allow unauthorized access.
To fix CVE-2016-4911, upgrade to OpenStack Identity (Keystone) version 9.0.1 or later.
CVE-2016-4911 allows remote authenticated users to maintain access privileges by preventing token revocation.
CVE-2016-4911 affects OpenStack Keystone versions before 9.0.1, including 9.0.0.0-rc1, 9.0.0.0-rc2, and 9.0.0.0-rc3.
Yes, CVE-2016-4911 can be exploited by authenticated users to bypass intended access restrictions.