First published: Wed May 06 2020(Updated: )
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | <15.0.1 | |
OpenStack Keystone | =16.0.0 | |
Canonical Ubuntu Linux | =18.04 | |
pip/keystone | =16.0.0 | 16.0.1 |
pip/keystone | <15.0.1 | 15.0.1 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:26.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in OpenStack Keystone is CVE-2020-12689.
The severity level of CVE-2020-12689 is high, with a score of 8.8.
CVE-2020-12689 allows any user authenticated within a limited scope to create an EC2 credential with escalated permissions, such as obtaining admin while on a limited viewer role.
CVE-2020-12689 affects OpenStack Keystone versions before 15.0.1 and 16.0.0.
The remedy for CVE-2020-12689 is to update to the recommended versions of Keystone, which are 2:14.2.0-0+deb10u1, 2:18.0.0-3+deb11u1, 2:22.0.0-2, and 2:24.0.0-1 (for Debian), or 2:13.0.4-0ubuntu1 (for Ubuntu).