First published: Fri Jul 20 2018(Updated: )
A flaw was found in Keystone federation. By doing GET /v3/OS-FEDERATION/projects an authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =9.0 | |
Redhat Openstack | =10 | |
Redhat Openstack | =12 | |
Redhat Openstack | =13 | |
OpenStack Keystone | <11.0.4 | |
OpenStack Keystone | =12.0.0 | |
OpenStack Keystone | =13.0.0 | |
debian/keystone | 2:14.2.0-0+deb10u1 2:18.0.0-3+deb11u1 2:22.0.0-2 2:24.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14432 is a vulnerability in the Federation component of OpenStack Keystone that allows an authenticated user to bypass access restrictions and discover projects they have no authority to access.
The severity of CVE-2018-14432 is high with a CVSS score of 5.3.
CVE-2018-14432 allows an authenticated user to leak project information that they shouldn't have access to in OpenStack Keystone.
Yes, there are known fixes for CVE-2018-14432. Please refer to the official references for remediation steps.
You can find more information about CVE-2018-14432 in the official references provided.