First published: Fri Jul 20 2018(Updated: )
A flaw was found in Keystone federation. By doing GET /v3/OS-FEDERATION/projects an authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1606868 is classified as high due to the potential unauthorized discovery of projects.
To mitigate the vulnerability REDHAT-BUG-1606868, ensure that proper access controls are configured for the /v3/OS-FEDERATION endpoint in the policy.json file.
The vulnerability REDHAT-BUG-1606868 affects OpenStack Keystone when the /v3/OS-FEDERATION endpoint is enabled.
No, authentication alone is not sufficient as REDHAT-BUG-1606868 allows authenticated users to access unauthorized project information.
REDHAT-BUG-1606868 can expose project information and attributes that should remain confidential to unauthorized users.