First published: Wed Sep 10 2014(Updated: )
The OpenStack project reports: "" Title: Configuration option leak through Keystone catalog Reporter: Brant Knudson (IBM) Products: Keystone Versions: up to 2013.2.3 and 2014.1 versions up to 2014.1.2.1 Description: Brant Knudson from IBM reported a vulnerability in Keystone catalog URL replacement. By creating a malicious endpoint a privileged user may reveal configuration options resulting in sensitive information, like master admin_token, being exposed through the service url. All Keystone setups that allow non-admin users to create endpoints are affected. "" Acknowledgements: Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware | <=2013.2.3<=2014.1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1139937 is classified as medium due to the potential exposure of sensitive configuration options.
To fix REDHAT-BUG-1139937, upgrade Keystone to a version newer than 2014.1.2.1 or apply recommended patches that address this vulnerability.
Versions of OpenStack Keystone up to and including 2013.2.3 and 2014.1 up to 2014.1.2.1 are affected by REDHAT-BUG-1139937.
REDHAT-BUG-1139937 exposes configuration options through the Keystone catalog that could be exploited if accessed by unauthorized users.
The vulnerability REDHAT-BUG-1139937 was reported by Brant Knudson from IBM.