[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5563Date: (C)2012-12-20   (M)2023-12-22


OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.0
Exploit Score: 8.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-51423
SECUNIA-51436
BID-56727
RHSA-2012:1557
USN-1641-1
http://www.openwall.com/lists/oss-security/2012/11/28/5
http://www.openwall.com/lists/oss-security/2012/11/28/6
folsom-tokens-security-bypass(80370)
https://bugs.launchpad.net/keystone/+bug/1079216
https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5
https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681

CPE    1
cpe:/a:openstack:folsom:2012.2
CWE    1
CWE-255
OVAL    1
oval:org.secpod.oval:def:701082

© SecPod Technologies