First published: Wed May 06 2020(Updated: )
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | <15.0.1 | |
OpenStack Keystone | =16.0.0 | |
pip/keystone | >=16.0.0.0rc1<16.0.0 | 16.0.0 |
pip/keystone | <15.0.1 | 15.0.1 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:26.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12690 is an issue discovered in OpenStack Keystone before version 15.0.1 and 16.0.0 where the list of roles provided for an OAuth1 access token is silently ignored.
CVE-2020-12690 allows an access token to contain every role assignment the creator had for the project when used to request a keystone token.
The severity of CVE-2020-12690 is rated as high, with a severity score of 8.8.
OpenStack Keystone versions before 15.0.1 and 16.0.0 are affected by CVE-2020-12690.
To fix CVE-2020-12690, upgrade to OpenStack Keystone version 15.0.1 or 16.0.0.