First published: Thu Apr 06 2017(Updated: )
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | =11.0.0 | 11.0.1 |
pip/keystone | >=10.0.0<=10.0.1 | 10.0.2 |
pip/keystone | >=9.0.0<=9.3.0 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2673 is classified as a high severity vulnerability due to its potential to allow unauthorized access to administrative roles.
To remediate CVE-2017-2673, upgrade Keystone to version 10.0.2 or 11.0.1, or apply any other relevant patches provided by Red Hat.
CVE-2017-2673 affects authenticated federated users of the OpenStack Identity service in Red Hat OpenStack versions 9 and 10.
Due to CVE-2017-2673, authenticated users can unintentionally be granted all related roles, including administrative roles.
CVE-2017-2673 specifically impacts the Keystone component of the OpenStack Identity service.