Vulnerability CVE-2013-2104


Published: 2014-01-21

Description:
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Keystone PKI tokens validation Missing expiration check
Eoghan Glynn
29.05.2013

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.5/10
4.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Openstack -> Python-keystoneclient 

 References:
https://bugs.launchpad.net/python-keystoneclient/+bug/1179615
http://www.ubuntu.com/usn/USN-1875-1
http://www.ubuntu.com/usn/USN-1851-1
http://www.openwall.com/lists/oss-security/2013/05/28/7
http://rhn.redhat.com/errata/RHSA-2013-0944.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00198.html

Copyright 2024, cxsecurity.com

 

Back to Top