Vulnerability CVE-2015-1852


Published: 2015-04-17   Modified: 2015-04-18

Description:
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Openstack -> Keystonemiddleware 
Openstack -> Python-keystoneclient 
Canonical -> Ubuntu linux 

 References:
http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html
http://rhn.redhat.com/errata/RHSA-2015-1677.html
http://rhn.redhat.com/errata/RHSA-2015-1685.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/74187
http://www.ubuntu.com/usn/USN-2705-1
https://bugs.launchpad.net/keystonemiddleware/+bug/1411063

Copyright 2024, cxsecurity.com

 

Back to Top