First published: Mon Dec 09 2019(Updated: )
A vulnerability was found in Keystone's list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could leak sign-on information for Time-based One Time Passwords (TOTP) or othewise. Deployments running keystone with enforce_scope set to false are affected. There will be a slight performance impact for the list credentials API once this issue is fixed. Affects: ==15.0.0, ==16.0.0
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | =16.0.0 | 16.0.1 |
pip/keystone | =15.0.0 | 15.0.1 |
OpenStack Keystone | =15.0.0 | |
OpenStack Keystone | =16.0.0 | |
redhat/keystone 16.0.0 | <5 | 5 |
redhat/keystone 15.0.0 | <18 | 18 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:26.0.0~rc1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-19687.
OpenStack Keystone 15.0.0 and 16.0.0 are affected.
The severity of CVE-2019-19687 is high (8.8).
To fix the vulnerability, update to OpenStack Keystone 15.0.1, 16.0.1, or a later version.
You can find more information about this vulnerability in the references provided: [link1], [link2], [link3].