CVE-2013-2166
- EPSS 0.09%
- Veröffentlicht 10.12.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 01:51:10
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
CVE-2013-2167
- EPSS 0.83%
- Veröffentlicht 10.12.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 01:51:10
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
CVE-2015-1852
- EPSS 0.22%
- Veröffentlicht 17.04.2015 17:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which...
CVE-2014-7144
- EPSS 0.37%
- Veröffentlicht 02.10.2014 14:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows...
- EPSS 0.37%
- Veröffentlicht 15.04.2014 14:55:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic c...
CVE-2013-2104
- EPSS 0.77%
- Veröffentlicht 21.01.2014 18:55:09
- Zuletzt bearbeitet 11.04.2025 00:51:21
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it e...
CVE-2013-2013
- EPSS 0.07%
- Veröffentlicht 01.10.2013 20:55:33
- Zuletzt bearbeitet 11.04.2025 00:51:21
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.