First published: Wed May 06 2020(Updated: )
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | <15.0.1 | |
OpenStack Keystone | =16.0.0 | |
Canonical Ubuntu Linux | =18.04 | |
pip/keystone | >=0<15.0.1 | 15.0.1 |
pip/keystone | >=16.0.0.0rc1<16.0.0 | 16.0.0 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:26.0.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12692 is medium.
The EC2 API vulnerability in CVE-2020-12692 allows an attacker to reissue an OpenStack token an unlimited number of times.
OpenStack Keystone versions before 15.0.1 and 16.0.0 are affected by CVE-2020-12692.
To fix the vulnerability in OpenStack Keystone, you should update to version 15.0.1 or 16.0.0.
More information about CVE-2020-12692 can be found at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2020/05/07/1), [Reference 2](https://bugs.launchpad.net/keystone/+bug/1872737), [Reference 3](https://security.openstack.org/ossa/OSSA-2020-003.html).