First published: Mon Nov 05 2012(Updated: )
Within the OpenStack keystone package the file /etc/keystone/ec2rc is world readable and contains: === ADMIN_ACCESS=109a7daa83054fc58ec8ade83b114117 ADMIN_SECRET=3bbbcba9514e4e8e8d0eb9e528754091 DEMO_ACCESS=81c2326383e34b888e0589057bc7fae2 DEMO_SECRET=ceb87a47838a442ea2923ad1bd6f0a16 === Also please note that the /etc/keystone/ directory should probably not be world readable at all.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack keystonemiddleware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-873447 is critical due to the exposure of sensitive credentials in a world-readable file.
To fix REDHAT-BUG-873447, change the permissions of the /etc/keystone/ec2rc file to restrict access.
The components affected by REDHAT-BUG-873447 are the OpenStack keystone package.
REDHAT-BUG-873447 exposes the ADMIN_ACCESS, ADMIN_SECRET, DEMO_ACCESS, and DEMO_SECRET credentials.
REDHAT-BUG-873447 poses a security risk of unauthorized access to the OpenStack environment due to exposed sensitive information.