First published: Wed May 06 2020(Updated: )
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | <15.0.1 | |
OpenStack Keystone | =16.0.0 | |
Canonical Ubuntu Linux | =18.04 | |
pip/keystone | =16.0.0 | 16.0.1 |
pip/keystone | <15.0.1 | 15.0.1 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:26.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12691 is high, with a severity score of 8.8.
CVE-2020-12691 affects OpenStack Keystone versions before 15.0.1 and 16.0.0.
An authenticated user can create an EC2 credential for themselves and masquerade as another user.
The recommended remedy for CVE-2020-12691 is to update to the latest versions of OpenStack Keystone, which are 15.0.1 and 16.0.0.
CVE-2020-12691 is associated with CWE ID 863.